jca f30fba0b97 SECURITY update to gnupg-1.4.21
CVE-2016-6313:  * Fix critical security bug in the RNG [CVE-2016-6313].
   An attacker who obtains 580 bytes from the standard RNG can trivially
   predict  the next 20 bytes of output.  Problem detected by Felix
   Dörre and Vladimir Klebanov, KIT.

Main behavior changes:
- CAST5 -> AES for symmetric encryption
- MD5 sigs rejected by default

ok danj@
2016-08-26 08:27:48 +00:00

3 lines
113 B
Plaintext

SHA256 (gnupg-1.4.21.tar.gz) = so5ugC8I2w/IzxMM8Ufyrc7vji7+yKe76V9B5H+AoLA=
SIZE (gnupg-1.4.21.tar.gz) = 5162404