-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.1993
                           gnupg security update
                              18 August 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           gnupg
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Reduced Security -- Unknown/Unspecified
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-6313  

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3649

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running gnupg check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3649-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
August 17, 2016                       https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : gnupg
CVE ID         : CVE-2016-6313

Felix Doerre and Vladimir Klebanov from the Karlsruhe Institute of
Technology discovered a flaw in the mixing functions of GnuPG's random
number generator. An attacker who obtains 4640 bits from the RNG can
trivially predict the next 160 bits of output.

A first analysis on the impact of this bug for GnuPG shows that existing
RSA keys are not weakened. For DSA and Elgamal keys it is also unlikely
that the private key can be predicted from other public information.

For the stable distribution (jessie), this problem has been fixed in
version 1.4.18-7+deb8u2.

We recommend that you upgrade your gnupg packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=k16Z
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=XaZf
-----END PGP SIGNATURE-----