CVE-2016-6313: * Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who obtains 580 bytes from the standard RNG can trivially predict the next 20 bytes of output. Problem detected by Felix Dörre and Vladimir Klebanov, KIT. Main behavior changes: - CAST5 -> AES for symmetric encryption - MD5 sigs rejected by default ok danj@
3 lines
113 B
Plaintext
3 lines
113 B
Plaintext
SHA256 (gnupg-1.4.21.tar.gz) = so5ugC8I2w/IzxMM8Ufyrc7vji7+yKe76V9B5H+AoLA=
|
|
SIZE (gnupg-1.4.21.tar.gz) = 5162404
|