Linux Security
    Linux Security
    Linux Security

    Debian: gnupg Crytographic weakness

    Date 18 Feb 2004
    Posted By LinuxSecurity Advisories
    Phong Nguyen identified a severe bug in the way GnuPG creates and usesElGamal keys for signing.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 429-2                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Matt Zimmerman
    February 13th, 2004            
    - --------------------------------------------------------------------------
    Package        : gnupg
    Vulnerability  : cryptographic weakness
    Problem-Type   : local
    Debian-specific: no
    CVE Ids        : CAN-2003-0971
    Phong Nguyen identified a severe bug in the way GnuPG creates and uses
    ElGamal keys for signing.  This is a significant security failure
    which can lead to a compromise of almost all ElGamal keys used for
    The update provided in DSA 459-1 disables the use of this type of key,
    using an interim fix.  This update, DSA 459-2, implements a more
    correct and permanent fix provided by David Shaw.
    For the current stable distribution (woody) this problem has been
    fixed in version 1.0.6-4woody3.
    We recommend that you update your gnupg package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      577 f5a742233c584754c479daf7dfe58a9e
          Size/MD5 checksum:     5262 1ecf9f459e0b05c31128adac05ef2fe4
          Size/MD5 checksum:  1941676 7c319a9e5e70ad9bc3bf0d7b5008a508
      Alpha architecture:
          Size/MD5 checksum:  1150082 724d4fcb6f2ff0969b5ceba82e8aabe5
      ARM architecture:
          Size/MD5 checksum:   986748 8efdbc409f140c1aaefadb97646944d6
      Intel IA-32 architecture:
          Size/MD5 checksum:   966408 50e5e44b2efa34d7c7d3a8fd630dc96a
      Intel IA-64 architecture:
          Size/MD5 checksum:  1271406 4c5e77defc13bf4bae3d11431257e6a3
      HP Precision architecture:
          Size/MD5 checksum:  1058822 02516b6984cf695ef31c970980d36864
      Motorola 680x0 architecture:
          Size/MD5 checksum:   942188 ed7d9d16820608b3172be64f6b470b97
      Big endian MIPS architecture:
          Size/MD5 checksum:  1035630 9b25dd3f06580549bfa93ee429605d0e
      Little endian MIPS architecture:
          Size/MD5 checksum:  1035864 740243a767cc1ff53f116d0e97aa66a7
      PowerPC architecture:
          Size/MD5 checksum:  1009152 678b2fc28d01eac452d96f925d2d40b2
      IBM S/390 architecture:
          Size/MD5 checksum:  1001666 c5a70add4dfa1cb3828d9892513d3c15
      Sun Sparc architecture:
          Size/MD5 checksum:  1003634 32490333505f1804e9fcf4a786fbc293
      These files will probably be moved into the stable distribution on
      its next revision.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.