Ubuntu Security Notice (C) 2013 Canonical, Inc. / NASL script (C) 2013 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related patches.
Yuval Yarom and Katrina Falkner discovered a timing-based information
leak, known as Flush+Reload, that could be used to trace execution in
programs. GnuPG and Libgcrypt followed different execution paths based
on key-related data, which could be used to expose the contents of
Update the affected gnupg and / or libgcrypt11 packages.
Risk factor :
Low / CVSS Base Score : 1.9
CVSS Temporal Score : 1.7
Public Exploit Available : true