Fedora Core 1 : gnupg-1.2.3-2 (2003-025)

High Nessus Plugin ID 13663


The remote Fedora Core host is missing a security update.


Phong Nguyen identified a severe bug in the way GnuPG creates and uses ElGamal keys, when those keys are used both to sign and encrypt data.
This vulnerability can be used to trivially recover the private key.
While the default behavior of GnuPG when generating keys does not lead to the creation of unsafe keys, by overriding the default settings an unsafe key could have been created.

If you are using ElGamal keys, you should revoke those keys immediately.

The packages included in this update do not make ElGamal keys safe to use; they merely include a patch by David Shaw that disables functions that would generate or use ElGamal keys for encryption.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected gnupg and / or gnupg-debuginfo packages.

See Also


Plugin Details

Severity: High

ID: 13663

File Name: fedora_2003-025.nasl

Version: $Revision: 1.12 $

Type: local

Agent: unix

Published: 2004/07/23

Modified: 2015/10/21

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:gnupg, p-cpe:/a:fedoraproject:fedora:gnupg-debuginfo, cpe:/o:fedoraproject:fedora_core:1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2003/12/10

Reference Information

FEDORA: 2003-025