<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="b3712e67d3ab02ccf8377ad5c9667233"!-->
<update status="stable" from="maint-coord@suse.de" type="security" version="2819">
  <id>dbg111-gpg2</id>
  <title>gpg2: reuses a freed pointer when verifying a signature</title>
  <release>openSUSE 11.1 DEBUGINFO</release>
  <issued date="1280335152"/>
  <references>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=625947" id="625947" title="bug number 625947" type="bugzilla"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2547" id="CVE-2010-2547" title="CVE-2010-2547" type="cve"/>
  </references>
  <description>GnuPG2 was vulnerable to arbitrary code execution by
context-dependent attackers because of reusing a freed
pointer when verifying a signature or importing a
certificate with many &quot;Subject Alternate Names&quot;.
(CVE-2010-2547)
</description>
  <pkglist>
    <collection>
        <package name="gpg2-debuginfo" arch="i586" version="2.0.9" release="25.109.1">
          <filename>gpg2-debuginfo-2.0.9-25.109.1.i586.rpm</filename>
        </package>
        <package name="gpg2-debuginfo" arch="ppc" version="2.0.9" release="25.109.1">
          <filename>gpg2-debuginfo-2.0.9-25.109.1.ppc.rpm</filename>
        </package>
        <package name="gpg2-debuginfo" arch="x86_64" version="2.0.9" release="25.109.1">
          <filename>gpg2-debuginfo-2.0.9-25.109.1.x86_64.rpm</filename>
        </package>
        <package name="gpg2-debugsource" arch="i586" version="2.0.9" release="25.109.1">
          <filename>gpg2-debugsource-2.0.9-25.109.1.i586.rpm</filename>
        </package>
        <package name="gpg2-debugsource" arch="ppc" version="2.0.9" release="25.109.1">
          <filename>gpg2-debugsource-2.0.9-25.109.1.ppc.rpm</filename>
        </package>
        <package name="gpg2-debugsource" arch="x86_64" version="2.0.9" release="25.109.1">
          <filename>gpg2-debugsource-2.0.9-25.109.1.x86_64.rpm</filename>
        </package>
    </collection>
  </pkglist>
</update>
