Paketname
gnupg
Datum
2003-11-28
Advisory ID
MDKSA-2003:109
Betroffene Versionen
9.2 amd64 , CS2.1 x86_64 , CS2.1 i586 , 9.2 i586 , 9.0 i586 , 9.1 i586 , MNF8.2 i586 , 9.1 i586

Problembeschreibung

A severe vulnerability was discovered in GnuPG by Phong Nguyen relating to ElGamal sign+encrypt keys. From Werner Koch's email message: "Phong Nguyen identified a severe bug in the way GnuPG creates and uses ElGamal keys for signing. This is a significant security failure which can lead to a compromise of almost all ElGamal keys used for signing. Note that this is a real world vulnerability which will reveal your private key within a few seconds. Please *take immediate action and revoke your ElGamal signing keys*. Furthermore you should take whatever measures necessary to limit the damage done for signed or encrypted documents using that key." And also: "Note that the standard keys as generated by GnuPG (DSA and ElGamal encryption) as well as RSA keys are NOT vulnerable. Note also that ElGamal signing keys cannot be generated without the use of a special flag to enable hidden options and even then overriding a warning message about this key type. See below for details on how to identify vulnerable keys." MandrakeSoft urges any users who use the ElGamal sign+encrypt keys to immediately revoke these keys and discontinue use of them. Updated packages are provided that remove the ability to create these keys and to create signatures using these keys (thanks to David Shaw for writing the patch).

Aktualisierte Pakete

9.2 amd64

 07ff9b065fabb157ae141015f7db0a77  amd64/9.2/RPMS/gnupg-1.2.3-3.1.92mdk.amd64.rpm
0f5d1244d156a0b229c0d27e07c67b35  amd64/9.2/SRPMS/gnupg-1.2.3-3.1.92mdk.src.rpm

CS2.1 x86_64

 7c4be5a2e952dd10c10f9242b91b51de  x86_64/corporate/2.1/RPMS/gnupg-1.0.7-3.2.C21mdk.x86_64.rpm
9294c6b3587a3a177b1d7ac57c1a0db2  x86_64/corporate/2.1/SRPMS/gnupg-1.0.7-3.2.C21mdk.src.rpm

CS2.1 i586

 d134c826e4fae506ccde3be7686888bc  corporate/2.1/RPMS/gnupg-1.0.7-3.2.C21mdk.i586.rpm
9294c6b3587a3a177b1d7ac57c1a0db2  corporate/2.1/SRPMS/gnupg-1.0.7-3.2.C21mdk.src.rpm

9.2 i586

 03d66699b92149590b078298063a1744  9.2/RPMS/gnupg-1.2.3-3.1.92mdk.i586.rpm
0f5d1244d156a0b229c0d27e07c67b35  9.2/SRPMS/gnupg-1.2.3-3.1.92mdk.src.rpm

9.0 i586

 f4f876cd0988362fba3718450727fd95  9.0/RPMS/gnupg-1.0.7-3.2.90mdk.i586.rpm
a459cb6e80e56562eac4a40a2ece3777  9.0/SRPMS/gnupg-1.0.7-3.2.90mdk.src.rpm

9.1 i586

 cdec75d7675fdb36874e61795800f582  9.1/RPMS/gnupg-1.2.2-1.2.91mdk.i586.rpm
08bba4f56d5d5eb581be7170e058133a  9.1/SRPMS/gnupg-1.2.2-1.2.91mdk.src.rpm

MNF8.2 i586

 b59a3c9a6c27c8d0c52e7a83d1ca3c75  mnf8.2/RPMS/gnupg-1.0.7-3.2.M82mdk.i586.rpm
d4dbfe3968a94705f7a7e175e00d03c9  mnf8.2/SRPMS/gnupg-1.0.7-3.2.M82mdk.src.rpm

9.1 i586

 4c41071186f40d9895a1032ced8d0601  ppc/9.1/RPMS/gnupg-1.2.2-1.2.91mdk.ppc.rpm
08bba4f56d5d5eb581be7170e058133a  ppc/9.1/SRPMS/gnupg-1.2.2-1.2.91mdk.src.rpm

Referenzen