Lucene search

K
slackwareSlackware Linux ProjectSSA-2013-287-02
HistoryOct 15, 2013 - 12:18 a.m.

[slackware-security] gnupg2

2013-10-1500:18:13
Slackware Linux Project
www.slackware.com
8

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.045 Low

EPSS

Percentile

92.4%

New gnupg2 packages are available for Slackware 13.37, 14.0, and -current to
fix security issues.

These packages will require the updated libgpg-error package.

Here are the details from the Slackware 14.0 ChangeLog:

patches/packages/gnupg2-2.0.22-i486-1_slack14.0.txz: Upgraded.
Fixed possible infinite recursion in the compressed packet
parser. [CVE-2013-4402]
Protect against rogue keyservers sending secret keys.
For more information, see:
https://vulners.com/cve/CVE-2013-4402
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/gnupg2-2.0.22-i486-1_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/gnupg2-2.0.22-x86_64-1_slack13.37.txz

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/gnupg2-2.0.22-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/gnupg2-2.0.22-x86_64-1_slack14.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/gnupg2-2.0.22-i486-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/gnupg2-2.0.22-x86_64-1.txz

MD5 signatures:

Slackware 13.37 package:
2194f25dba02397b2323fa1d3c9c15ea gnupg2-2.0.22-i486-1_slack13.37.txz

Slackware x86_64 13.37 package:
7565e99bdd15bdd86097938c979f8b6b gnupg2-2.0.22-x86_64-1_slack13.37.txz

Slackware 14.0 package:
a9080b0567a8f98ae1189bdbf8c88aad gnupg2-2.0.22-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
5ac9c035acafa7b339d887bc67a96d89 gnupg2-2.0.22-x86_64-1_slack14.0.txz

Slackware -current package:
03ce9cfc9d2c8cc763a60e78f1788698 n/gnupg2-2.0.22-i486-1.txz

Slackware x86_64 -current package:
9f82aafc690fae866d71734ff4bb377f n/gnupg2-2.0.22-x86_64-1.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg gnupg2-2.0.22-i486-1_slack14.0.txz

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.045 Low

EPSS

Percentile

92.4%