CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
EPSS
Percentile
54.9%
Issue Overview:
GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications are not typically expected to protect themselves from acoustic side-channel attacks, since this is arguably the responsibility of the physical device. Accordingly, issues of this type would not normally receive a CVE identifier. However, for this issue, the developer has specified a security policy in which GnuPG should offer side-channel resistance, and developer-specified security-policy violations are within the scope of CVE.
Affected Packages:
gnupg
Issue Correction:
Run yum update gnupg to update your system.
New Packages:
i686:
gnupg-1.4.16-2.23.amzn1.i686
gnupg-debuginfo-1.4.16-2.23.amzn1.i686
src:
gnupg-1.4.16-2.23.amzn1.src
x86_64:
gnupg-debuginfo-1.4.16-2.23.amzn1.x86_64
gnupg-1.4.16-2.23.amzn1.x86_64
Red Hat: CVE-2013-4576
Mitre: CVE-2013-4576
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | gnupg | < 1.4.16-2.23.amzn1 | gnupg-1.4.16-2.23.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | gnupg-debuginfo | < 1.4.16-2.23.amzn1 | gnupg-debuginfo-1.4.16-2.23.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | gnupg-debuginfo | < 1.4.16-2.23.amzn1 | gnupg-debuginfo-1.4.16-2.23.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | gnupg | < 1.4.16-2.23.amzn1 | gnupg-1.4.16-2.23.amzn1.x86_64.rpm |