GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sun Jun 05, 2016 9:26 pm Post subject: [ GLSA 201606-04 ] GnuPG |
|
|
Gentoo Linux Security Advisory
Title: GnuPG: Multiple vulnerabilities (GLSA 201606-04)
Severity: normal
Exploitable: local, remote
Date: June 05, 2016
Updated: June 10, 2016
Bug(s): #534110, #541564, #541568
ID: 201606-04
Synopsis
Multiple vulnerabilities have been found in GnuPG and libgcrypt,
the worst of which may allow a local attacker to obtain confidential key
information.
Background
The GNU Privacy Guard, GnuPG, is a free replacement for the PGP suite of
cryptographic software.
Affected Packages
Package: app-crypt/gnupg
Vulnerable: < 2.0.26-r3
Unaffected: >= 2.0.26-r3
Unaffected: >= 1.4.19 < 1.4.20
Unaffected: >= 1.4.20 < 1.4.21
Unaffected: >= 1.4.21 < 1.4.22
Unaffected: >= 1.4.22 < 1.4.23
Architectures: All supported architectures
Package: dev-libs/libgcrypt
Vulnerable: < 1.6.3-r4
Unaffected: >= 1.6.3-r4
Architectures: All supported architectures
Description
Multiple vulnerabilities have been discovered in GnuPG and libgcrypt,
please review the CVE identifiers referenced below for details.
Impact
A local attacker could possibly cause a Denial of Service condition.
Side-channel attacks could be leveraged to obtain key material.
Workaround
There is no known workaround at this time.
Resolution
All GnuPG 2 users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-crypt/gnupg-2.0.26-r3"
| All GnuPG 1 users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.19"
| All libgcrypt users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/libgcrypt-1.6.3-r4"
|
References
CVE-2014-3591
CVE-2015-0837
Last edited by GLSA on Sat Jun 11, 2016 4:17 am; edited 1 time in total |
|