-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] gnupg2 (SSA:2014-175-03) New gnupg2 packages are available for Slackware 13.37, 14.0, 14.1, and -current to fix a security issue. Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/gnupg2-2.0.24-i486-1_slack14.1.txz: Upgraded. This release includes a security fix to stop a denial of service using garbled compressed data packets which can be used to put gpg into an infinite loop. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/gnupg2-2.0.24-i486-1_slack13.37.txz Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/gnupg2-2.0.24-x86_64-1_slack13.37.txz Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/gnupg2-2.0.24-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/gnupg2-2.0.24-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/gnupg2-2.0.24-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/gnupg2-2.0.24-x86_64-1_slack14.1.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/gnupg2-2.0.24-i486-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/gnupg2-2.0.24-x86_64-1.txz MD5 signatures: +-------------+ Slackware 13.37 package: cc0c37aacd0d3eab10f353d3f82f3584 gnupg2-2.0.24-i486-1_slack13.37.txz Slackware x86_64 13.37 package: 8c76fafd4e469785dd571ad84a679a18 gnupg2-2.0.24-x86_64-1_slack13.37.txz Slackware 14.0 package: 47bc00e244c2c52d8177fbae205b6609 gnupg2-2.0.24-i486-1_slack14.0.txz Slackware x86_64 14.0 package: d76d81aa67d0806ad3a85b4e1772bd31 gnupg2-2.0.24-x86_64-1_slack14.0.txz Slackware 14.1 package: 3649d32b6fb1733320acbc47ca10ff02 gnupg2-2.0.24-i486-1_slack14.1.txz Slackware x86_64 14.1 package: 9f77fb4f094295c4c396d02fba3b8159 gnupg2-2.0.24-x86_64-1_slack14.1.txz Slackware -current package: a14b1af17da04ccc4651215c84682d5d n/gnupg2-2.0.24-i486-1.txz Slackware x86_64 -current package: 02705c86d2231234533427c1cd5b1da3 n/gnupg2-2.0.24-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg gnupg2-2.0.24-i486-1_slack14.1.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAlOqAvoACgkQakRjwEAQIjO2awCdHF/iW1GYIOnsy4sf1eCJwtUp WVUAn0ee54UHmm5caJobLl278I31wAJO =wWwq -----END PGP SIGNATURE-----