drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Preisgabe von Informationen in GnuPG
Name: |
Preisgabe von Informationen in GnuPG |
|
ID: |
USN-1923-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.04 |
|
Datum: |
Do, 1. August 2013, 08:00 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242 |
|
Applikationen: |
The GNU Privacy Guard |
|
Originalnachricht |
--===============1942188787606933335== Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="IJpNTDwzlM2Ie8A6" Content-Disposition: inline
--IJpNTDwzlM2Ie8A6 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-1923-1 August 01, 2013
gnupg, libgcrypt11 vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.04 - Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS
Summary:
GnuPG and Libgcrypt could be made to expose sensitive information.
Software Description: - gnupg: GNU privacy guard - a free PGP replacement - libgcrypt11: LGPL Crypto library - runtime library
Details:
Yuval Yarom and Katrina Falkner discovered a timing-based information leak, known as Flush+Reload, that could be used to trace execution in programs. GnuPG and Libgcrypt followed different execution paths based on key-related data, which could be used to expose the contents of private keys.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 13.04: gnupg 1.4.12-7ubuntu1.1 libgcrypt11 1.5.0-3ubuntu2.2
Ubuntu 12.10: gnupg 1.4.11-3ubuntu4.2 libgcrypt11 1.5.0-3ubuntu1.1
Ubuntu 12.04 LTS: gnupg 1.4.11-3ubuntu2.3 libgcrypt11 1.5.0-3ubuntu0.2
Ubuntu 10.04 LTS: gnupg 1.4.10-2ubuntu1.3 libgcrypt11 1.4.4-5ubuntu2.2
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1923-1 CVE-2013-4242
Package Information: https://launchpad.net/ubuntu/+source/gnupg/1.4.12-7ubuntu1.1 https://launchpad.net/ubuntu/+source/libgcrypt11/1.5.0-3ubuntu2.2 https://launchpad.net/ubuntu/+source/gnupg/1.4.11-3ubuntu4.2 https://launchpad.net/ubuntu/+source/libgcrypt11/1.5.0-3ubuntu1.1 https://launchpad.net/ubuntu/+source/gnupg/1.4.11-3ubuntu2.3 https://launchpad.net/ubuntu/+source/libgcrypt11/1.5.0-3ubuntu0.2 https://launchpad.net/ubuntu/+source/gnupg/1.4.10-2ubuntu1.3 https://launchpad.net/ubuntu/+source/libgcrypt11/1.4.4-5ubuntu2.2
--IJpNTDwzlM2Ie8A6 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iQEcBAEBAgAGBQJR+b51AAoJEPMhclmdjS6X+agH/1/hCk5ulqk565zh2ahst68R ksUNRrUshm+aIv7ShZvTS6HOMNMn1IwOpcPjf1hBkGg6UIWUhhouLqycaC3p4P95 U16wKh69tw4/OY83fPudeVt/4Yz9IBO4KvM5+3m07VpnxEPc5GwAmK1Flg8IMCrR WgaVWwXlT6yku4bCn9ykHlmJcHlxG2M9Gm0xoF43O8+HWTgVadlk9cD/U4paA1Hp biJOX9VMAD9TMdqSZgzC9BLgl3zF39Ezjv7Xs/Zz3m5LfE5waPRuz2b4qHMOPjBG +Xs7QnFDF1OAjmZd3cqH/WylIjHH3wIbtCSYMuzJuoDV13QLsFJVXIO3rU6vrLA= =3ulk -----END PGP SIGNATURE-----
--IJpNTDwzlM2Ie8A6--
--===============1942188787606933335== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============1942188787606933335==--
|
|
|
|