Abuse Melding

Je hebt een klacht over de onderstaande posting:

18-08-2016, 15:49 door Erik van Straten

En hoe veilig is de GnuPG key waarmee de signatures zijn of zullen worden gezet? Uit [1]: Security fixes for Libgcrypt and GnuPG 1.4 important A bug in the random number generator of Libgcrypt and in GnuPG 1.4 has been found. Updating the software is highly suggested. Please read this mail [2] for details. Note that the CVE id in that mail is not correct, the correct one is CVE-2016-6313. Uit [2] (CVE nummer in titel door mij gecorrigeerd): Wed Aug 17 18:06:56 CEST 2016, door Werner Koch: [Announce] Security fixes for Libgcrypt and GnuPG 1.4 [CVE-2016-6313] Hello! The GnuPG Project is pleased to announce the availability of new Libgcrypt and GnuPG versions to *fix a critical security problem*. Felix Dörre and Vladimir Klebanov from the Karlsruhe Institute of Technology found a bug in the mixing functions of Libgcrypt's random number generator: An attacker who obtains 4640 bits from the RNG can trivially predict the next 160 bits of output. This bug exists since 1998 in all GnuPG and Libgcrypt ...

Beschrijf je klacht (Optioneel):

captcha