Your submission was sent successfully! Close

USN-2339-1: GnuPG vulnerability

3 September 2014

GnuPG could expose sensitive information when performing decryption.

Releases

Packages

  • gnupg - GNU privacy guard - a free PGP replacement

Details

Daniel Genkin, Adi Shamir, and Eran Tromer discovered that GnuPG was
susceptible to an adaptive chosen ciphertext attack via physical side
channels. A local attacker could use this attack to possibly recover
private keys.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04
Ubuntu 10.04

In general, a standard system update will make all the necessary changes.

References

Related notices

  • USN-2339-2: libgcrypt11-doc, libgcrypt11-udeb, libgcrypt11, libgcrypt11-dev
  • USN-2554-1: gnupg-curl, scdaemon, gpgv, gpgsm, gpgv2, gnupg-udeb, gnupg, gpgv-udeb, gnupg2, gnupg-agent