Your submission was sent successfully! Close

USN-3733-1: GnuPG vulnerability

7 August 2018

GnuPG could be made to expose sensitive information.



  • gnupg - GNU privacy guard - a free PGP replacement


Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink,
Nadia Heninger, Tanja Lange, Christine van Vredendaal, and Yuval Yarom
discovered that GnuPG is vulnerable to a cache side-channel attack. A local
attacker could use this attack to recover RSA private keys.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04
Ubuntu 14.04

In general, a standard system update will make all the necessary changes.

Related notices

  • USN-3733-2: gnupg, gpgv, gnupg-curl
  • USN-3347-2: libgcrypt11
  • USN-3347-1: libgcrypt20, libgcrypt11-dev, libgcrypt20-udeb, libgcrypt20-dev, libgcrypt11-doc, libgcrypt11, libgcrypt20-doc, libgcrypt11-udeb