Ubuntu Security Notice 2059-1 - Daniel Genkin, Adi Shamir, and Eran Tromer discovered that GnuPG was susceptible to an adaptive chosen ciphertext attack via acoustic emanations. A local attacker could use this attack to possibly recover private keys.
16ac9e783f1fa692c48f7890174bad76117c06f8e39951e4f7f09ea68b7bdfaf
============================================================================
Ubuntu Security Notice USN-2059-1
December 18, 2013
gnupg vulnerability
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.10
- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
GnuPG could expose sensitive information when performing decryption.
Software Description:
- gnupg: GNU privacy guard - a free PGP replacement
Details:
Daniel Genkin, Adi Shamir, and Eran Tromer discovered that GnuPG was
susceptible to an adaptive chosen ciphertext attack via acoustic
emanations. A local attacker could use this attack to possibly recover
private keys.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.10:
gnupg 1.4.14-1ubuntu2.1
Ubuntu 13.04:
gnupg 1.4.12-7ubuntu1.3
Ubuntu 12.10:
gnupg 1.4.11-3ubuntu4.4
Ubuntu 12.04 LTS:
gnupg 1.4.11-3ubuntu2.5
Ubuntu 10.04 LTS:
gnupg 1.4.10-2ubuntu1.5
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2059-1
CVE-2013-4576
Package Information:
https://launchpad.net/ubuntu/+source/gnupg/1.4.14-1ubuntu2.1
https://launchpad.net/ubuntu/+source/gnupg/1.4.12-7ubuntu1.3
https://launchpad.net/ubuntu/+source/gnupg/1.4.11-3ubuntu4.4
https://launchpad.net/ubuntu/+source/gnupg/1.4.11-3ubuntu2.5
https://launchpad.net/ubuntu/+source/gnupg/1.4.10-2ubuntu1.5