Login
Newsletter
Werbung

Sicherheit: Preisgabe von Informationen in GnuPG
Aktuelle Meldungen Distributionen
Name: Preisgabe von Informationen in GnuPG
ID: USN-1923-1
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.04
Datum: Do, 1. August 2013, 08:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242
Applikationen: The GNU Privacy Guard

Originalnachricht


--===============1942188787606933335==
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature";
boundary="IJpNTDwzlM2Ie8A6"
Content-Disposition: inline


--IJpNTDwzlM2Ie8A6
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-1923-1
August 01, 2013

gnupg, libgcrypt11 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

GnuPG and Libgcrypt could be made to expose sensitive information.

Software Description:
- gnupg: GNU privacy guard - a free PGP replacement
- libgcrypt11: LGPL Crypto library - runtime library

Details:

Yuval Yarom and Katrina Falkner discovered a timing-based information leak,
known as Flush+Reload, that could be used to trace execution in programs.
GnuPG and Libgcrypt followed different execution paths based on key-related
data, which could be used to expose the contents of private keys.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.04:
gnupg 1.4.12-7ubuntu1.1
libgcrypt11 1.5.0-3ubuntu2.2

Ubuntu 12.10:
gnupg 1.4.11-3ubuntu4.2
libgcrypt11 1.5.0-3ubuntu1.1

Ubuntu 12.04 LTS:
gnupg 1.4.11-3ubuntu2.3
libgcrypt11 1.5.0-3ubuntu0.2

Ubuntu 10.04 LTS:
gnupg 1.4.10-2ubuntu1.3
libgcrypt11 1.4.4-5ubuntu2.2

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1923-1
CVE-2013-4242

Package Information:
https://launchpad.net/ubuntu/+source/gnupg/1.4.12-7ubuntu1.1
https://launchpad.net/ubuntu/+source/libgcrypt11/1.5.0-3ubuntu2.2
https://launchpad.net/ubuntu/+source/gnupg/1.4.11-3ubuntu4.2
https://launchpad.net/ubuntu/+source/libgcrypt11/1.5.0-3ubuntu1.1
https://launchpad.net/ubuntu/+source/gnupg/1.4.11-3ubuntu2.3
https://launchpad.net/ubuntu/+source/libgcrypt11/1.5.0-3ubuntu0.2
https://launchpad.net/ubuntu/+source/gnupg/1.4.10-2ubuntu1.3
https://launchpad.net/ubuntu/+source/libgcrypt11/1.4.4-5ubuntu2.2


--IJpNTDwzlM2Ie8A6
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJR+b51AAoJEPMhclmdjS6X+agH/1/hCk5ulqk565zh2ahst68R
ksUNRrUshm+aIv7ShZvTS6HOMNMn1IwOpcPjf1hBkGg6UIWUhhouLqycaC3p4P95
U16wKh69tw4/OY83fPudeVt/4Yz9IBO4KvM5+3m07VpnxEPc5GwAmK1Flg8IMCrR
WgaVWwXlT6yku4bCn9ykHlmJcHlxG2M9Gm0xoF43O8+HWTgVadlk9cD/U4paA1Hp
biJOX9VMAD9TMdqSZgzC9BLgl3zF39Ezjv7Xs/Zz3m5LfE5waPRuz2b4qHMOPjBG
+Xs7QnFDF1OAjmZd3cqH/WylIjHH3wIbtCSYMuzJuoDV13QLsFJVXIO3rU6vrLA=
=3ulk
-----END PGP SIGNATURE-----

--IJpNTDwzlM2Ie8A6--


--===============1942188787606933335==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============1942188787606933335==--
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung