CVE-2013-4242
Publication date 29 July 2013
Last updated 24 July 2024
Ubuntu priority
Description
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| gnupg | 13.04 raring |
Fixed 1.4.12-7ubuntu1.1
|
| 12.10 quantal |
Fixed 1.4.11-3ubuntu4.2
|
|
| 12.04 LTS precise |
Fixed 1.4.11-3ubuntu2.3
|
|
| 10.04 LTS lucid |
Fixed 1.4.10-2ubuntu1.3
|
|
| libgcrypt11 | 13.04 raring |
Fixed 1.5.0-3ubuntu2.2
|
| 12.10 quantal |
Fixed 1.5.0-3ubuntu1.1
|
|
| 12.04 LTS precise |
Fixed 1.5.0-3ubuntu0.2
|
|
| 10.04 LTS lucid |
Fixed 1.4.4-5ubuntu2.2
|
Patch details
| Package | Patch details |
|---|---|
| gnupg | |
| libgcrypt11 |
References
Related Ubuntu Security Notices (USN)
- USN-1923-1
- GnuPG, Libgcrypt vulnerability
- 1 August 2013