Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.1572 gnupg security update 12 September 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: gnupg Publisher: Debian Operating System: Debian GNU/Linux 7 Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Access Privileged Data -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2014-5270 Original Bulletin: http://www.debian.org/security/2014/dsa-3024 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running gnupg check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-3024-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst September 11, 2014 http://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : gnupg CVE ID : CVE-2014-5270 Debian Bug : 725411 Genkin, Pipman and Tromer discovered a side-channel attack on Elgamal encryption subkeys (CVE-2014-5270). In addition, this update hardens GnuPG's behaviour when treating keyserver responses; GnuPG now filters keyserver responses to only accepts those keyid's actually requested by the user. For the stable distribution (wheezy), this problem has been fixed in version 1.4.12-7+deb7u6. For the testing (jessie) and unstable distribution (sid), this problem has been fixed in version 1.4.18-4. We recommend that you upgrade your gnupg packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJUEgcFAAoJEFb2GnlAHawEK40H/i9VVDxZhEXnPZakg6677rd5 MfVHXpq0cYHV3qu4ll8z4i5ZYghKoWD4nCF9A6U4K7rxIK+k4jXmCMWcC6fAnSaJ Kqc0PIOyIrN/Yz4je904COkIvAYMWJKj9TaqAAxVSzQGGRiCFFzw0IMZp8Qj/sy1 1oI+x+sJKFsmTF1mhOAhBM6Bdo/k3HMhMQ92Eoxd4/cW1p3XoQXgc+qU3y4Uvxz9 YUB7WyXyWZDwMjiFOBavE9Yk/cYXNrpPC/6eUCnwzTgi7MZhN5AqSP9IowY95gAH Foa6vfXeSD3e2jydIJD6m6LNiIPXf+IC8q+x3BAEoeyt3Afp+lfBIDecKUVtOPo= =5tow - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVBI66RLndAQH1ShLAQIjnw/+PDvLDIfVTIDQ8rl8pEQLO28S1QIkkMo4 aNZNccDeYO3Q+1MwrjXgf9QGi8CoLWMxM6jLRH9kuWNCznwtt2Ewvlrvb6u9AmxM aGcNawI28mCZ1skaUaoxiGLRlHZ5Ms1QiJgyuRNQlhWCWPgqvne71P6CA463ml4I tIj7xOZfyUKpg898Bt77Xnig6qJwXqSFOcB9f7Z/CYUY+aG04F0Bp7TMNO9U5bsl lV7xOJykVg6tor3n3dl3+wa/ZhEdDY7MIyPw2GJvKvfVKWOUU5dIKgiLDfdc22bL BzzD3hYW9RNzQpGnKeKoqr8XLKfg5Ko70ybBruAnvoiShSLdHoRxScwTueZZX8s3 q5hwEXJZYu4vH+BjGQWxdNFjrVTRwChPsLzSWm8+HP8XOax5xQVyxjsNYgxWHSyY /CZorQpIbYH9alOisYUae+jQcUPfws7S8fbDW190WtouMDbPoCDO4RNrbpMX1pEe SRhzllByZokkGryvn/vuKq6LG0sxyrWn00ACm1SFre/mC3gPr5zZ9sLCbx5PSVMY O3O3JNKmER6ldZ+WmyMGyPgU6/QUgpdk9YF3TSbom5Pkhaibd4Dme2jZ5MgArfvQ FJp03T7LIoIaqF6FGDEVgaFd8ZPXZzKdKX5tv5P9tgkN3l/9ymBk5GWCMdHIGQra IPhF70AaX9g= =Etb7 -----END PGP SIGNATURE-----