Felix Dörre and Vladimir Klebanov discovered that GnuPG incorrectly handled mixing functions in the random number generator. An attacker able to obtain 4640 bits from the RNG can trivially predict the next 160 bits of output.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.4.16-1ubuntu2.4", "binary_name": "gnupg" }, { "binary_version": "1.4.16-1ubuntu2.4", "binary_name": "gnupg-curl" }, { "binary_version": "1.4.16-1ubuntu2.4", "binary_name": "gnupg-curl-dbgsym" }, { "binary_version": "1.4.16-1ubuntu2.4", "binary_name": "gnupg-dbgsym" }, { "binary_version": "1.4.16-1ubuntu2.4", "binary_name": "gnupg-udeb" }, { "binary_version": "1.4.16-1ubuntu2.4", "binary_name": "gnupg-udeb-dbgsym" }, { "binary_version": "1.4.16-1ubuntu2.4", "binary_name": "gpgv" }, { "binary_version": "1.4.16-1ubuntu2.4", "binary_name": "gpgv-dbgsym" }, { "binary_version": "1.4.16-1ubuntu2.4", "binary_name": "gpgv-udeb" }, { "binary_version": "1.4.16-1ubuntu2.4", "binary_name": "gpgv-udeb-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.4.20-1ubuntu3.1", "binary_name": "gnupg" }, { "binary_version": "1.4.20-1ubuntu3.1", "binary_name": "gnupg-curl" }, { "binary_version": "1.4.20-1ubuntu3.1", "binary_name": "gnupg-curl-dbgsym" }, { "binary_version": "1.4.20-1ubuntu3.1", "binary_name": "gnupg-dbg" }, { "binary_version": "1.4.20-1ubuntu3.1", "binary_name": "gnupg-dbgsym" }, { "binary_version": "1.4.20-1ubuntu3.1", "binary_name": "gpgv" }, { "binary_version": "1.4.20-1ubuntu3.1", "binary_name": "gpgv-dbgsym" }, { "binary_version": "1.4.20-1ubuntu3.1", "binary_name": "gpgv-udeb" }, { "binary_version": "1.4.20-1ubuntu3.1", "binary_name": "gpgv-udeb-dbgsym" } ] }