-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : libxdmcp Version : 1:1.1.1-1+deb8u1 CVE ID : CVE-2017-2625
It has been found, that libxdmcp, an X11 Display Manager Control Protocol library, uses weak entropy to generate keys.
Using arc4random_buf() from libbsd should avoid this flaw. For Debian 8 "Jessie", this problem has been fixed in version 1:1.1.1-1+deb8u1. We recommend that you upgrade your libxdmcp packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAl3cRZVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcACgkQlvysDTh7 WEcFvA/9GWIUAecbQYnhimCT82f3MuoOYRmFtzTL/YmJznkhYHAl4jhit/tJdL4l Mp1kwSPA8Paxe1HTrP2QJFfuGYnBYcQDDocWJDQ6A8/LaupZyE7OgAhafTh9gtry RRMZEWWKSSSIkAP44/CETu1D6vLi61wIUFmWYyuKKPgqJeYlqsVptiQLY04v9x4r IvRdL4yB8FqAEOWLd/h0uuX5l/8AiqiTgrqHBSuqvVMno3/U/3iOgL4uqkf4MAFQ cZ1yW6BsY6NXtsUbUEG3yEsmDX3JEuYtdZGO6ScJxSZDivrrX593NwljVk/q0FjW +ycBiXMbWMm6x2ECzHezWimFtd1SR51fs/l2H+rE2bsE/fwvttVVw3bvLgvJqhas I39xUhyAAoqA7RUEoYerpIkuAj21qi7JBFkGtW4qG30FSbe5V6MEW2Se81aB58DQ Iirtcr0lU3uhWziyM43fmSuynejpIapmGpLSZ1w5TtHt7j6DIviQbRZsXWKQkwQT nEEUNmyvC11gAHO/Iugzy5JXdnVCXI4MrGsbev7EznIj1AASDgtjhVm/Pp4tQHqk ZFdfmrpcS0FAx+KgArNrrgOBNSzVdLt/fCtRsnaQFAJeqVFaqb6M5LutvAymxqr+ p8U1tQ9Q30lbQNvSuqQaW+xCYzm4fXf13+hMbSfl6WgJsMbk7uk= =UO4i -----END PGP SIGNATURE-----
