Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Slackware Advisory SSA:2006-340-01b gnupg [resigned]
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host is missing an update as announced via advisory SSA:2006-340-01b.
Insight
Insight
As many people have pointed out, the last advisory (SSA:2006-340-01) was not signed with the usual Slackware Security Team key (fingerprint 40102233). I did some reconfiguration on the box that does the distribution signing and it had some unintended side-effects. :-/ Several CHECKSUMS.md5.asc files were also signed with the wrong key. The affected CHECKSUMS.md5 files have been resigned and uploaded, and this announcement has also been signed (and verified :-) using the usual primary Slackware signing key. Also, it was noticed that the URL given to lists.gnupg.org was either incorrect or has changed since the advisory was issued. This error has also been corrected. Sorry for any confusion. Pat Corrected advisory follows: +-----------+ [slackware-security] gnupg (SSA:2006-340-01) New gnupg packages are available for Slackware 9.0, 9.1, 10.0, 10.1, 10.2, and 11.0 to fix security issues. More details about the issues is linked in the references.
Solution
Solution
Upgrade to the new package(s).