-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1572
                           gnupg security update
                             12 September 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           gnupg
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Access Privileged Data -- Remote with User Interaction
                   Reduced Security       -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-5270  

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-3024

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running gnupg check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3024-1                   security@debian.org
http://www.debian.org/security/                           Thijs Kinkhorst                       
September 11, 2014                     http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : gnupg
CVE ID         : CVE-2014-5270
Debian Bug     : 725411

Genkin, Pipman and Tromer discovered a side-channel attack on Elgamal
encryption subkeys (CVE-2014-5270).

In addition, this update hardens GnuPG's behaviour when treating
keyserver responses; GnuPG now filters keyserver responses to only
accepts those keyid's actually requested by the user.

For the stable distribution (wheezy), this problem has been fixed in
version 1.4.12-7+deb7u6.

For the testing (jessie) and unstable distribution (sid), this
problem has been fixed in version 1.4.18-4.

We recommend that you upgrade your gnupg packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJUEgcFAAoJEFb2GnlAHawEK40H/i9VVDxZhEXnPZakg6677rd5
MfVHXpq0cYHV3qu4ll8z4i5ZYghKoWD4nCF9A6U4K7rxIK+k4jXmCMWcC6fAnSaJ
Kqc0PIOyIrN/Yz4je904COkIvAYMWJKj9TaqAAxVSzQGGRiCFFzw0IMZp8Qj/sy1
1oI+x+sJKFsmTF1mhOAhBM6Bdo/k3HMhMQ92Eoxd4/cW1p3XoQXgc+qU3y4Uvxz9
YUB7WyXyWZDwMjiFOBavE9Yk/cYXNrpPC/6eUCnwzTgi7MZhN5AqSP9IowY95gAH
Foa6vfXeSD3e2jydIJD6m6LNiIPXf+IC8q+x3BAEoeyt3Afp+lfBIDecKUVtOPo=
=5tow
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Etb7
-----END PGP SIGNATURE-----