bbc19c9988
plaintext recovery attack on OpenPGP ciphertexts encrypted with ElGamal. Only certain combinations of sender and receiver software are exposed. We found that GPG (via Libgcrypt) and Crypto++ are affected when acting as sender, while Go is not. https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1#faq
6 lines
418 B
Plaintext
6 lines
418 B
Plaintext
untrusted comment: verify with /etc/ports/contrib.pub
|
|
RWSagIOpLGJF3zt91CFRdDDBwKuFMTJkU5ly2GEBhMYyLQdNGkr6P2rjA7O0WoyGWv9SzGtMbUbbykTGltYQslVT+r+giYhxUQI=
|
|
SHA256 (Pkgfile) = bb1345fb0769f0006f614abb65739e562a4400e1eef8cb90ad3c3662ac88a5fb
|
|
SHA256 (.footprint) = bb802f25fc40dde765471d18343ca1406de088fb804937929353c98b0d395ccc
|
|
SHA256 (cryptopp860.zip) = 20aa413957d9c8ae353ee2f7747bd7ac392f933c60a53e3fd1e41cadbc48d193
|