oss-sec mailing list archives

Re : Re: [oss-security] Re : Re: [oss-security] CVE-2018-12020 in GnuPG


From: Stiepan <stie@itk.swiss>
Date: Tue, 12 Jun 2018 16:56:13 -0400

Hi Yves-Alexis,

Any updates on this?

By the way, it might be the occasion to switch to more future-proof signatures, such as
https://datatracker.ietf.org/doc/rfc8391 , which are reputed as quantum-safe and do not depend on some hardness 
assumptions.
We could help with an open-source implem. if needed.
Apparently, NIST is also moving into that direction for software signatures, according to information given now at 
ETSI's security week.

Best regards,
Stiepan A. Kovac
President
itk AVtobvS SARL

Envoyé depuis ProtonMail mobile

-------- Message d'origine --------
On 10 juin 2018 à 18:38, Yves-Alexis Perez a écrit :

On Sun, 2018-06-10 at 10:58 -0400, Stiepan wrote:

Hi Stepian,

This responsibility discussion is all well and fine, but now that this is
half-public, may we know for sure whether we are affected :
1. as debian(-like) package consumers

Not entirely sure what you mean here, but if you're talking about the apt
package managers (which relies on gpgv for signature verification), it's
currently investigated.

Note that all supported suites have had their gnupg version updated: https://s
ecurity-tracker.debian.org/tracker/CVE-2018-12020

Regards,
--
Yves-Alexis

Current thread: