USN-2339-1: GnuPG vulnerability
3 September 2014
GnuPG could expose sensitive information when performing decryption.
Releases
Packages
- gnupg - GNU privacy guard - a free PGP replacement
Details
Daniel Genkin, Adi Shamir, and Eran Tromer discovered that GnuPG was
susceptible to an adaptive chosen ciphertext attack via physical side
channels. A local attacker could use this attack to possibly recover
private keys.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
Ubuntu 10.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-2339-2: libgcrypt11-dev, libgcrypt11-doc, libgcrypt11, libgcrypt11-udeb
- USN-2554-1: gpgv2, gnupg, gpgsm, gnupg-curl, scdaemon, gnupg2, gnupg-agent, gpgv-udeb, gpgv, gnupg-udeb