Ubuntu Security Notice (C) 2016 Canonical, Inc. / NASL script (C) 2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
Felix Dorre and Vladimir Klebanov discovered that GnuPG incorrectly
handled mixing functions in the random number generator. An attacker
able to obtain 4640 bits from the RNG can trivially predict the next
160 bits of output.
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected gnupg package.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.1
Public Exploit Available : true