USN-3733-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-3733-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-3733-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3733-1
Related
Published
2018-08-07T02:50:28.182820Z
Modified
2018-08-07T02:50:28.182820Z
Summary
gnupg vulnerability
Details

Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, and Yuval Yarom discovered that GnuPG is vulnerable to a cache side-channel attack. A local attacker could use this attack to recover RSA private keys.

References

Affected packages

Ubuntu:14.04:LTS / gnupg

Package

Name
gnupg

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.16-1ubuntu2.6

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "gnupg": "1.4.16-1ubuntu2.6",
            "gpgv": "1.4.16-1ubuntu2.6",
            "gnupg-curl": "1.4.16-1ubuntu2.6",
            "gnupg-udeb": "1.4.16-1ubuntu2.6",
            "gpgv-udeb": "1.4.16-1ubuntu2.6"
        }
    ]
}

Ubuntu:16.04:LTS / gnupg

Package

Name
gnupg

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.20-1ubuntu3.3

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "gnupg": "1.4.20-1ubuntu3.3",
            "gpgv": "1.4.20-1ubuntu3.3",
            "gnupg-curl": "1.4.20-1ubuntu3.3",
            "gpgv-udeb": "1.4.20-1ubuntu3.3"
        }
    ]
}