gnupg 보안 업데이트
Web Browser 로는 FTP 접속이 불가능 합니다.
문서번호 : 1142870415
업데이트 : 2006.03.21
gpg in GnuPG before 220.127.116.11 does not properly verify non-detached signatures,
which allows attackers to inject unsigned data via a data packet that is not
associated with a control packet, which causes the check for concatenated
signatures to report that the signature is valid, a different vulnerability
gpgv in GnuPG before 18.104.22.168, when using unattended signature verification,
returns a 0 exit code in certain cases even when the detached signature file
does not carry a signature, which could cause programs that use gpgv to assume
that the signature verification has succeeded. Note: this also occurs when
running the equivalent command "gpg --verify".
Autoupdates 지원 : 지원