GnuPG, Libgcrypt: Multiple vulnerabilities Multiple vulnerabilities have been discovered in GnuPG and Libgcrypt, which may result in execution of arbitrary code, Denial of Service, or the disclosure of private keys. gnupg libgcrypt February 21, 2014 August 24, 2016: 3 449546 478184 484836 487230 494658 local, remote 2.0.22 1.4.16 1.4.17 1.4.18 1.4.19 1.4.20 1.4.21 2.0.22 1.5.3 1.5.3

The GNU Privacy Guard, GnuPG, is a free replacement for the PGP suite of cryptographic software. Libgcrypt is a cryptographic library based on GnuPG.

Multiple vulnerabilities have been discovered in GnuPG and Libgcrypt. Please review the CVE identifiers referenced below for details.

An unauthenticated remote attacker may be able to execute arbitrary code with the privileges of the user running GnuPG, cause a Denial of Service condition, or bypass security restrictions. Additionally, a side-channel attack may allow a local attacker to recover a private key, please review “Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack” in the References section for further details.

There is no known workaround at this time.

All GnuPG 2.0 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-2.0.22"

All GnuPG 1.4 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.16"

All Libgcrypt users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/libgcrypt-1.5.3"
CVE-2012-6085 CVE-2013-4242 CVE-2013-4351 CVE-2013-4402 Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack ackle ackle