Mandrake Linux Security Advisory : gnupg (MDKSA-2001:053-1)

High Nessus Plugin ID 13870


The remote Mandrake Linux host is missing a security update.


A format string vulnerability exists in gnupg 1.0.5 and previous versions which is fixed in 1.0.6. This vulnerability can be used to invoke shell commands with privileges of the currently logged-in user.

Update :

The /usr/bin/gpg executable was installed setuid root and setgid root.
While being setuid root offers locking pages in physical memory to avoid writing sensitive material to swap and is of benefit, being setgid root provides no benefits and allows users to write to files that have group root access. This update strips the setgid bit from /usr/bin/gpg.


Update the affected gnupg package.

See Also

Plugin Details

Severity: High

ID: 13870

File Name: mandrake_MDKSA-2001-053.nasl

Version: $Revision: 1.17 $

Type: local

Published: 2004/07/31

Modified: 2013/08/09

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:gnupg, cpe:/o:mandrakesoft:mandrake_linux:7.1, cpe:/o:mandrakesoft:mandrake_linux:7.2, cpe:/o:mandrakesoft:mandrake_linux:8.0, cpe:/o:mandrakesoft:mandrake_linux:8.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2001/11/20

Reference Information

CVE: CVE-2001-0522

MDKSA: 2001:053-1