First published: Wed Aug 15 2018(Updated: )
USN-3733-1 fixed a vulnerability in GnuPG. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, and Yuval Yarom discovered that GnuPG is vulnerable to a cache side-channel attack. A local attacker could use this attack to recover RSA private keys.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/gnupg-curl | <1.4.11-3ubuntu2.12 | 1.4.11-3ubuntu2.12 |
Ubuntu OpenSSH Client | =12.04 | |
All of | ||
ubuntu/gpgv | <1.4.11-3ubuntu2.12 | 1.4.11-3ubuntu2.12 |
Ubuntu OpenSSH Client | =12.04 | |
All of | ||
ubuntu/gnupg | <1.4.11-3ubuntu2.12 | 1.4.11-3ubuntu2.12 |
Ubuntu OpenSSH Client | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-3733-2 addresses a vulnerability in GnuPG affecting the Ubuntu 12.04 ESM version.
The affected packages for USN-3733-2 include gnupg, gpgv, and gnupg-curl, all of which must be updated to version 1.4.11-3ubuntu2.12.
To fix vulnerability USN-3733-2, update the affected packages gnupg, gpgv, and gnupg-curl to version 1.4.11-3ubuntu2.12.
The severity of vulnerability USN-3733-2 is considered important due to its potential impact on system security.
Yes, patches are available in the Ubuntu repositories for USN-3733-2 that resolve the identified vulnerability.