Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.1993 gnupg security update 18 August 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: gnupg Publisher: Debian Operating System: Debian GNU/Linux 8 UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Reduced Security -- Unknown/Unspecified Resolution: Patch/Upgrade CVE Names: CVE-2016-6313 Original Bulletin: http://www.debian.org/security/2016/dsa-3649 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running gnupg check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-3649-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso August 17, 2016 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : gnupg CVE ID : CVE-2016-6313 Felix Doerre and Vladimir Klebanov from the Karlsruhe Institute of Technology discovered a flaw in the mixing functions of GnuPG's random number generator. An attacker who obtains 4640 bits from the RNG can trivially predict the next 160 bits of output. A first analysis on the impact of this bug for GnuPG shows that existing RSA keys are not weakened. For DSA and Elgamal keys it is also unlikely that the private key can be predicted from other public information. For the stable distribution (jessie), this problem has been fixed in version 1.4.18-7+deb8u2. We recommend that you upgrade your gnupg packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJXtNXhAAoJEAVMuPMTQ89EdesP/0ggsyZeF7DiWIEryM/3EgNa 0qxOnOzq3Op8wF8dYcBOtS/qCv9aXEBUw0pk+00BKKS1s7PS6HnGtAox0sJaej4B L0Fqiypz6nbYEIguSoCIZXFILxNyhbbotXs1CQn7kA86IiHiBnd3f345x+PhOorw tKSUXxclSZwLJQjub6YM5y/YqOBpskcOCdb25LQ3kQ1UHwQt8NPNHZRxlfb29805 h8nOaMEc4sdRltpdHllpwGGbSDT1csB4qTb8qy+6fWHSp/enj+KTAmV7MfibTa1C /wbXhHpP7+gr6fj0dyMOD9EfyFIpDZkZcuH8ZPx5hBdKj6SQ3e9ovyc2S7li2bDh TuXCuCbIeHkFw/EafFkuDaesDbeLqxQUr47sALZMHTzpZ6e+Xe3fXBGRj7Cr1MTp vlUkWOaYNwY+fmZkqQR4hMwBgdxRDy7xfZxKAzUji8RI/KEz0GJK23Ipiwcauk6Q o0Vjgrw1zPPz+IvIYsLg6jtFVPcd3PMHq8laWf9/sxD8VMQ2IDl8F8JqA5JHKtlX Kpoga9hAhjssUX8G4cqyMAUKxqBOMHmTKOqjtu5VIhU+os1oRg9VhA0KfaElXd4a PEox1qIYkdJ7dZiVKT2qP1iqJmL5/FTWllVrKdPPm1zkSZq8wKZo6LoLx8i4kDXm VvQ6HKyE+MYAQ5Xg7gbM =k16Z - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBV7VJ9Yx+lLeg9Ub1AQh2FBAAq+wqcjBf5hpK74D/MMfETu4wb8UfTcEI n+kst8tDCsTDZJ8NwuO5jH78yXeM9F2V8JV7/DF76iBi0N9HHwiuAyYqhsWj0i3/ AOj9mG4DVfusfrK5k5u22irDbf/fCCyDZx0tmjxIYT/C2hidlP4MGcY40rQPdPiV Qs/Rk0+ddEb7Bv5EMck6FVHAvPd2dsHyqWjt9SZNpx9X/GhhgNmVW3nFeUCeGxfZ 8PD6ekmhrlPRspb3azvAKgR798gPh/lIohXGUjbljKT035dfAkCmbfMhANnSES0Y 5kFcxjaCajG+XHO7VspMXrDWT9it0WDyk4svKWCnZCpPWrAPZoP4igj6Su2UUgWy HeWUKIhgi4WoZhxwIjTBqEMKxIzE8Kew0IyelOAjYa1jf86X/X5HjClGbiwgvXkH qHC6nxDHiUG3ZlbSaOwO9JeLPT13k8PGQ8fIIcP8DsAB9P7G1he6e4xN//mb7/sz C6foanoJ0773gpa9jknMlKsgHPvHs+X18nOKT8/JEhDNtPuR2pilHlXPIe/k8hcH 2QjASA3m3N+2Z30yjau4uKevSPb5RJO3PL/UBeS+LWpuFAfaiqNM2dRc0tmSFW/2 DFbxrQLfrvAtyOdfaWlQonPCTLDmw/VHWf0T3eUppR8sPX/bQGJmTfhxbNrxtsIL vmQ0fnC7Jds= =XaZf -----END PGP SIGNATURE-----