Daniel Genkin, Lev Pachmanov, Itamar Pipman, and Eran Tromer discovered that GnuPG was susceptible to an attack via physical side channels. A local attacker could use this attack to possibly recover private keys. (CVE-2014-3591)
Daniel Genkin, Adi Shamir, and Eran Tromer discovered that GnuPG was susceptible to an attack via physical side channels. A local attacker could use this attack to possibly recover private keys. (CVE-2015-0837)
Hanno Böck discovered that GnuPG incorrectly handled certain malformed keyrings. If a user or automated system were tricked into opening a malformed keyring, a remote attacker could use this issue to cause GnuPG to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2015-1606, CVE-2015-1607)
In addition, this update improves GnuPG security by validating that the keys returned by keyservers match those requested.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.4.16-1ubuntu2.3", "binary_name": "gnupg" }, { "binary_version": "1.4.16-1ubuntu2.3", "binary_name": "gnupg-curl" }, { "binary_version": "1.4.16-1ubuntu2.3", "binary_name": "gnupg-udeb" }, { "binary_version": "1.4.16-1ubuntu2.3", "binary_name": "gpgv" }, { "binary_version": "1.4.16-1ubuntu2.3", "binary_name": "gpgv-udeb" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.0.22-3ubuntu1.3", "binary_name": "gnupg-agent" }, { "binary_version": "2.0.22-3ubuntu1.3", "binary_name": "gnupg2" }, { "binary_version": "2.0.22-3ubuntu1.3", "binary_name": "gpgsm" }, { "binary_version": "2.0.22-3ubuntu1.3", "binary_name": "gpgv2" }, { "binary_version": "2.0.22-3ubuntu1.3", "binary_name": "scdaemon" } ] }