USN-2059-1: GnuPG vulnerability

Publication date

18 December 2013

Overview

GnuPG could expose sensitive information when performing decryption.


Packages

  • gnupg - GNU privacy guard - a free PGP replacement

Details

Daniel Genkin, Adi Shamir, and Eran Tromer discovered that GnuPG was
susceptible to an adaptive chosen ciphertext attack via acoustic
emanations. A local attacker could use this attack to possibly recover
private keys.

Daniel Genkin, Adi Shamir, and Eran Tromer discovered that GnuPG was
susceptible to an adaptive chosen ciphertext attack via acoustic
emanations. A local attacker could use this attack to possibly recover
private keys.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
13.10 saucy gnupg –  1.4.14-1ubuntu2.1
13.04 raring gnupg –  1.4.12-7ubuntu1.3
12.10 quantal gnupg –  1.4.11-3ubuntu4.4
12.04 precise gnupg –  1.4.11-3ubuntu2.5
10.04 lucid gnupg –  1.4.10-2ubuntu1.5

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›