GnuPG: Multiple vulnerabilities Multiple vulnerabilities have been found in GnuPG and libgcrypt, the worst of which may allow a local attacker to obtain confidential key information. gnupg 2016-06-05 2016-06-10 534110 541564 541568 local, remote 2.0.26-r3 1.4.19 1.4.20 1.4.21 1.4.22 2.0.26-r3 1.6.3-r4 1.6.3-r4

The GNU Privacy Guard, GnuPG, is a free replacement for the PGP suite of cryptographic software.

Multiple vulnerabilities have been discovered in GnuPG and libgcrypt, please review the CVE identifiers referenced below for details.

A local attacker could possibly cause a Denial of Service condition. Side-channel attacks could be leveraged to obtain key material.

There is no known workaround at this time.

All GnuPG 2 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-2.0.26-r3"

All GnuPG 1 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.19"

All libgcrypt users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/libgcrypt-1.6.3-r4"
CVE-2014-3591 CVE-2015-0837 BlueKnight stanley