Lucene search

K
ubuntuUbuntuUSN-1923-1
HistoryAug 01, 2013 - 12:00 a.m.

GnuPG, Libgcrypt vulnerability

2013-08-0100:00:00
ubuntu.com
38

1.9 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

6.1 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.3%

Releases

  • Ubuntu 13.04
  • Ubuntu 12.10
  • Ubuntu 12.04
  • Ubuntu 10.04

Packages

  • gnupg - GNU privacy guard - a free PGP replacement
  • libgcrypt11 - LGPL Crypto library - runtime library

Details

Yuval Yarom and Katrina Falkner discovered a timing-based information leak,
known as Flush+Reload, that could be used to trace execution in programs.
GnuPG and Libgcrypt followed different execution paths based on key-related
data, which could be used to expose the contents of private keys.

OSVersionArchitecturePackageVersionFilename
Ubuntu13.04noarchlibgcrypt11< 1.5.0-3ubuntu2.2UNKNOWN
Ubuntu13.04noarchlibgcrypt11-dbg< 1.5.0-3ubuntu2.2UNKNOWN
Ubuntu13.04noarchlibgcrypt11-dev< 1.5.0-3ubuntu2.2UNKNOWN
Ubuntu13.04noarchlibgcrypt11-udeb< 1.5.0-3ubuntu2.2UNKNOWN
Ubuntu13.04noarchgnupg< 1.4.12-7ubuntu1.1UNKNOWN
Ubuntu13.04noarchgnupg-curl< 1.4.12-7ubuntu1.1UNKNOWN
Ubuntu13.04noarchgnupg-udeb< 1.4.12-7ubuntu1.1UNKNOWN
Ubuntu13.04noarchgpgv< 1.4.12-7ubuntu1.1UNKNOWN
Ubuntu13.04noarchgpgv-udeb< 1.4.12-7ubuntu1.1UNKNOWN
Ubuntu12.10noarchlibgcrypt11< 1.5.0-3ubuntu1.1UNKNOWN
Rows per page:
1-10 of 361

1.9 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

6.1 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.3%