Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.13.2016.236.01
Category:Slackware Local Security Checks
Title:Slackware: Security Advisory (SSA:2016-236-01)
Summary:The remote host is missing an update for the 'gnupg' package(s) announced via the SSA:2016-236-01 advisory.
Description:Summary:
The remote host is missing an update for the 'gnupg' package(s) announced via the SSA:2016-236-01 advisory.

Vulnerability Insight:
New gnupg packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
14.2, and -current to fix a security issue.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/gnupg-1.4.21-i586-1_slack14.2.txz: Upgraded.
Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
obtains 580 bytes from the standard RNG can trivially predict the next
20 bytes of output. (This is according to the NEWS file included in the
source. According to the announcement linked below, an attacker who obtains
4640 bits from the RNG can trivially predict the next 160 bits of output.)
Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
For more information, see:
[links moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'gnupg' package(s) on Slackware 13.0, Slackware 13.1, Slackware 13.37, Slackware 14.0, Slackware 14.1, Slackware 14.2, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-6313
BugTraq ID: 92527
http://www.securityfocus.com/bid/92527
Debian Security Information: DSA-3649 (Google Search)
http://www.debian.org/security/2016/dsa-3649
Debian Security Information: DSA-3650 (Google Search)
http://www.debian.org/security/2016/dsa-3650
https://security.gentoo.org/glsa/201610-04
https://security.gentoo.org/glsa/201612-01
https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
RedHat Security Advisories: RHSA-2016:2674
http://rhn.redhat.com/errata/RHSA-2016-2674.html
http://www.securitytracker.com/id/1036635
http://www.ubuntu.com/usn/USN-3064-1
http://www.ubuntu.com/usn/USN-3065-1
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.