Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 12 Jun 2018 16:56:13 -0400
From: Stiepan <stie@....swiss>
To: corsac@...ian.org, oss-security@...ts.openwall.com, marcus.brinkmann@...r-uni-bochum.de
Subject: Re : Re: Re : Re: CVE-2018-12020 in GnuPG

Hi Yves-Alexis,

Any updates on this?

By the way, it might be the occasion to switch to more future-proof signatures, such as
https://datatracker.ietf.org/doc/rfc8391 , which are reputed as quantum-safe and do not depend on some hardness assumptions.
We could help with an open-source implem. if needed.
Apparently, NIST is also moving into that direction for software signatures, according to information given now at ETSI's security week.

Best regards,
Stiepan A. Kovac
President
itk AVtobvS SARL

Envoyé depuis ProtonMail mobile

-------- Message d'origine --------
On 10 juin 2018 à 18:38, Yves-Alexis Perez a écrit :

> On Sun, 2018-06-10 at 10:58 -0400, Stiepan wrote:
>
> Hi Stepian,
>
>> This responsibility discussion is all well and fine, but now that this is
>> half-public, may we know for sure whether we are affected :
>> 1. as debian(-like) package consumers
>
> Not entirely sure what you mean here, but if you're talking about the apt
> package managers (which relies on gpgv for signature verification), it's
> currently investigated.
>
> Note that all supported suites have had their gnupg version updated: https://s
> ecurity-tracker.debian.org/tracker/CVE-2018-12020
>
> Regards,
> --
> Yves-Alexis

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ