USN-2339-1: GnuPG vulnerability
3 September 2014
GnuPG could expose sensitive information when performing decryption.
Releases
Packages
- gnupg - GNU privacy guard - a free PGP replacement
Details
Daniel Genkin, Adi Shamir, and Eran Tromer discovered that GnuPG was
susceptible to an adaptive chosen ciphertext attack via physical side
channels. A local attacker could use this attack to possibly recover
private keys.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
Ubuntu 10.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-2339-2: libgcrypt11-dev, libgcrypt11-udeb, libgcrypt11-doc, libgcrypt11
- USN-2554-1: gpgv, scdaemon, gpgsm, gnupg, gnupg-agent, gpgv2, gnupg2, gpgv-udeb, gnupg-udeb, gnupg-curl