Package: gpg
Version: gnupg
Severity: normal
Tags: security

Hello,

The default cipher in gpg and gpg2 for symmetric encryption is CAST-5. CAST-5
block size is 64 bits and the cipher is used in CFB mode. CFB mode in
vulnerable to a practical attack when the size of the ciphertext is close to
sqrt(block_size). In the case of CAST-5 as well as for Blowfish and 3DES it
happens when the message more than ~ 1 Go long.

The problem has been solved upstream and in sid but not in jessie.

The following commits are available in the Git repository of GnuPG:

* fc30a414d8d6586207444356ec270bd3fe0f6e68 for gpg;
* 57df1121c18b004dd763b35eabf7b51fc9e8ec38 for gpg2.

Have a nice day.

Piotr Chmielnicki



-- System Information:
Debian Release: 8.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Reply via email to