Mandriva Linux Security Advisory : gnupg (MDVSA-2015:155)

Low Nessus Plugin ID 82408

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 3.6

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Updated gnupg and libgcrypt packages fix security vulnerabilities :

GnuPG before 1.4.19 is vulnerable to a side-channel attack which can potentially lead to an information leak (CVE-2014-3591).

GnuPG before 1.4.19 is vulnerable to a side-channel attack on data-dependent timing variations in modular exponentiation, which can potentially lead to an information leak (CVE-2015-0837).

The gnupg package has been patched to correct these issues.

GnuPG2 is vulnerable to these issues through the libgcrypt library.
The issues were fixed in libgcrypt 1.6.3. The libgcrypt package in Mandriva, at version 1.5.4, was only vulnerable to the CVE-2014-3591 issue. It has also been patched to correct this issue.

Solution

Update the affected gnupg, lib64gcrypt-devel and / or lib64gcrypt11 packages.

See Also

http://advisories.mageia.org/MGASA-2015-0104.html

Plugin Details

Severity: Low

ID: 82408

File Name: mandriva_MDVSA-2015-155.nasl

Version: 1.6

Type: local

Published: 2015/03/30

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Low

VPR Score: 3.6

CVSS v2.0

Base Score: 1.2

Temporal Score: 0.9

Vector: CVSS2#AV:L/AC:H/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:gnupg, p-cpe:/a:mandriva:linux:lib64gcrypt-devel, p-cpe:/a:mandriva:linux:lib64gcrypt11, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/03/29

Reference Information

CVE: CVE-2014-3591, CVE-2015-0837

BID: 73064, 73066

MDVSA: 2015:155