Lucene search

K
gentooGentoo FoundationGLSA-201402-24
HistoryFeb 21, 2014 - 12:00 a.m.

GnuPG, Libgcrypt: Multiple vulnerabilities

2014-02-2100:00:00
Gentoo Foundation
security.gentoo.org
9

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

0.05 Low

EPSS

Percentile

92.8%

Background

The GNU Privacy Guard, GnuPG, is a free replacement for the PGP suite of cryptographic software. Libgcrypt is a cryptographic library based on GnuPG.

Description

Multiple vulnerabilities have been discovered in GnuPG and Libgcrypt. Please review the CVE identifiers referenced below for details.

Impact

An unauthenticated remote attacker may be able to execute arbitrary code with the privileges of the user running GnuPG, cause a Denial of Service condition, or bypass security restrictions. Additionally, a side-channel attack may allow a local attacker to recover a private key, please review β€œFlush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack” in the References section for further details.

Workaround

There is no known workaround at this time.

Resolution

All GnuPG 2.0 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-2.0.22"

All GnuPG 1.4 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.16"

All Libgcrypt users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/libgcrypt-1.5.3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-crypt/gnupg<Β 2.0.22UNKNOWN
Gentooanyalldev-libs/libgcrypt<Β 1.5.3UNKNOWN

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

0.05 Low

EPSS

Percentile

92.8%