Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Slackware Advisory SSA:2006-340-01b gnupg [resigned]

Information

Severity

Severity

Critical

Family

Family

Slackware Local Security Checks

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

11 years ago

Modified

Modified

5 years ago

Summary

The remote host is missing an update as announced via advisory SSA:2006-340-01b.

Insight

Insight

As many people have pointed out, the last advisory (SSA:2006-340-01) was not signed with the usual Slackware Security Team key (fingerprint 40102233). I did some reconfiguration on the box that does the distribution signing and it had some unintended side-effects. :-/ Several CHECKSUMS.md5.asc files were also signed with the wrong key. The affected CHECKSUMS.md5 files have been resigned and uploaded, and this announcement has also been signed (and verified :-) using the usual primary Slackware signing key. Also, it was noticed that the URL given to lists.gnupg.org was either incorrect or has changed since the advisory was issued. This error has also been corrected. Sorry for any confusion. Pat Corrected advisory follows: +-----------+ [slackware-security] gnupg (SSA:2006-340-01) New gnupg packages are available for Slackware 9.0, 9.1, 10.0, 10.1, 10.2, and 11.0 to fix security issues. More details about the issues is linked in the references.

Solution

Solution

Upgrade to the new package(s).

Common Vulnerabilities and Exposures (CVE)