USN-3733-1: GnuPG vulnerability
7 August 2018
GnuPG could be made to expose sensitive information.
Releases
Packages
- gnupg - GNU privacy guard - a free PGP replacement
Details
Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink,
Nadia Heninger, Tanja Lange, Christine van Vredendaal, and Yuval Yarom
discovered that GnuPG is vulnerable to a cache side-channel attack. A local
attacker could use this attack to recover RSA private keys.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
Ubuntu 14.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3733-2: gpgv, gnupg-curl, gnupg
- USN-3347-2: libgcrypt11
- USN-3347-1: libgcrypt20-dev, libgcrypt20, libgcrypt20-doc, libgcrypt11-doc, libgcrypt20-udeb, libgcrypt11, libgcrypt11-udeb, libgcrypt11-dev