lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: aliz at gentoo.org (Daniel Ahlberg) Subject: GLSA: kgpg -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200211-002 - - -------------------------------------------------------------------- PACKAGE : kgpg SUMMARY : keys generated in wizard have an empty passphrase DATE : 2002-11-10 13:11 UTC EXPLOIT : local - - -------------------------------------------------------------------- - From http://devel-home.kde.org/~kgpg/bug.html A bug in Kgpg's key generation affects all secret keys generated through Kgpg's wizard. (Bug does not affect keys created in console/expert mode). All keys created through the wizard have an empty passphrase, which means that if someone has access to your computer and can read your secret key, he/she can decrypt your files whitout the need of a passphrase. SOLUTION It is recommended that all Gentoo Linux users who are running app-crypt/kgpg-0.8.2 and earlier update their systems as follows: emerge rsync emerge kgpg emerge clean - - -------------------------------------------------------------------- aliz@...too.org - GnuPG key is available at www.gentoo.org/~aliz hannes@...too.org - - -------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE9zmVTfT7nyhUpoZMRAlGnAKCqIwAhxi/OtU55GVFWc+waeIY7LwCgtRgf jglVyBs6JzNtzNEQZfz69nA= =EybQ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists