Ubuntu 10.04 LTS / 12.04 LTS / 12.10 / 13.04 : gnupg, libgcrypt11 vulnerability (USN-1923-1)

Ubuntu Security Notice (C) 2013 Canonical, Inc. / NASL script (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

Yuval Yarom and Katrina Falkner discovered a timing-based information
leak, known as Flush+Reload, that could be used to trace execution in
programs. GnuPG and Libgcrypt followed different execution paths based
on key-related data, which could be used to expose the contents of
private keys.

Solution :

Update the affected gnupg and / or libgcrypt11 packages.

Risk factor :

Low / CVSS Base Score : 1.9
(CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 1.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 69175 ()

Bugtraq ID: 61464

CVE ID: CVE-2013-4242