|Category:||Ubuntu Local Security Checks|
|Title:||Ubuntu: Security Advisory for gnupg2 (USN-4516-1)|
|Summary:||The remote host is missing an update for the 'gnupg2'; package(s) announced via the USN-4516-1 advisory.|
The remote host is missing an update for the 'gnupg2'
package(s) announced via the USN-4516-1 advisory.
It was discovered that GnuPG signatures could be forged when the SHA-1
algorithm is being used. This update removes validating signatures based on
SHA-1 that were generated after 2019-01-19. In environments where this is
still required, a new option --allow-weak-key-signatures can be used to
revert this behaviour.
'gnupg2' package(s) on Ubuntu 18.04 LTS.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2019-14855|
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.