|Category:||SuSE Local Security Checks|
|Title:||SuSE Update for python-python-gnupg openSUSE-SU-2018:1722-1 (python-python-gnupg)|
|Summary:||The remote host is missing an update for the 'python-python-gnupg'; package(s) announced via the openSUSE-SU-2018:1722_1 advisory.|
The remote host is missing an update for the 'python-python-gnupg'
package(s) announced via the openSUSE-SU-2018:1722_1 advisory.
This update for python-python-gnupg to version 0.4.3 fixes the following
The following security vulnerabilities were addressed:
- Sanitize diagnostic output of the original file name in verbose mode
The following other changes were made:
- Add --no-verbose to the gpg command line, in case verbose is specified
- Add expect_passphrase password for use on GnuPG = 2.1 when passing
passphrase to gpg via pinentry
- Provide a trust_keys method to allow setting the trust level for keys
- When the gpg executable is not found, note the path used in the
- Make error messages more informational
To install this openSUSE Security Update use the SUSE recommended
like YaST online_update or 'zypper patch'.
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-646=1
python-python-gnupg on openSUSE Leap 15.0.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2018-12020|
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 73533 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.