moderate: gnome-settings-daemon/gnupg2 security update
An update for gnome-settings-daemon/gnupg2 is now available for NewStart CGSL MAIN 6.02.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
gnome-settings-daemon: The gnome-settings-daemon-devel package contains libraries and header files for developing applications that use gnome-settings-daemon.
gnupg2: This package provides debug sources for package gnupg2. Debug sources are useful when developing applications that use this package or when debugging this package.
gnome-settings-daemon: A flaw was found in the GNOME Control Center, where it improperly uses Red Hat Customer Portal credentials when a user registers a system through the GNOME Settings User Interface. This flaw allows a local attacker to discover the Red Hat Customer Portal password. The highest threat from this vulnerability is to confidentiality.(CVE-2020-14391)
gnupg2: Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.(CVE-2019-13050)
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Remember the build tag is 6.02.50B5.