Bugzilla – Bug 1187212
VUL-0: CVE-2021-33560: libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm
Last modified: 2021-08-09 11:05:00 UTC
rh#1970096 Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. (There is also an interoperability problem because the selection of the k integer value does not properly consider the differences between basic ElGamal encryption and generalized ElGamal encryption.) This, for example, affects use of ElGamal in OpenPGP. References: https://dev.gnupg.org/T5466 https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61 https://dev.gnupg.org/T5305 https://dev.gnupg.org/T5328 References: https://bugzilla.redhat.com/show_bug.cgi?id=1970096 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33560 http://www.cvedetails.com/cve/CVE-2021-33560/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560 https://dev.gnupg.org/T5466 https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61 https://dev.gnupg.org/T5305 https://dev.gnupg.org/T5328
See also: cipher: Fix ElGamal encryption for other implementations. https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=632d80ef30e13de6926d503aa697f92b5dbfbc5e
Affected packages: - SUSE:SLE-11-SP2:Update/libgcrypt 1.5.0 - SUSE:SLE-11:Update/libgcrypt 1.4.1 - SUSE:SLE-12:Update/libgcrypt 1.6.1 - SUSE:SLE-15-SP1:Update/libgcrypt 1.8.2 - SUSE:SLE-15:Update/libgcrypt 1.8.2 - openSUSE:Factory/libgcrypt 1.9.3 Upstream patch [0]. [0] https://github.com/gpg/libgcrypt/commit/632d80ef30e13de6926d503aa697f92b5dbfbc5e.patch
(In reply to Gianluca Gabrielli from comment #2) > Upstream patch [0]. > > [0] > https://github.com/gpg/libgcrypt/commit/ > 632d80ef30e13de6926d503aa697f92b5dbfbc5e.patch Main patch is [1] https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
Thanks for your input. I just want to be sure you have seen that this commit message [0] mentions CVE-2021-33560, and yes it is related to the same GPG internal ticket T5328. [0] https://github.com/gpg/libgcrypt/commit/632d80ef30e13de6926d503aa697f92b5dbfbc5e
Factory submission: https://build.opensuse.org/request/show/899923
SUSE-SU-2021:14751-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1187212 CVE References: CVE-2021-33560 JIRA References: Sources used: SUSE Linux Enterprise Server 11-SP4-LTSS (src): libgcrypt-1.5.0-0.26.6.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): libgcrypt-1.5.0-0.26.6.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): libgcrypt-1.5.0-0.26.6.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): libgcrypt-1.5.0-0.26.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2021:2155-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1187212 CVE References: CVE-2021-33560 JIRA References: Sources used: SUSE Linux Enterprise Server for SAP 15 (src): libgcrypt-1.8.2-6.52.1 SUSE Linux Enterprise Server 15-LTSS (src): libgcrypt-1.8.2-6.52.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): libgcrypt-1.8.2-6.52.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): libgcrypt-1.8.2-6.52.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2021:2157-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1187212 CVE References: CVE-2021-33560 JIRA References: Sources used: SUSE MicroOS 5.0 (src): libgcrypt-1.8.2-8.39.1 SUSE Manager Server 4.0 (src): libgcrypt-1.8.2-8.39.1 SUSE Manager Retail Branch Server 4.0 (src): libgcrypt-1.8.2-8.39.1 SUSE Manager Proxy 4.0 (src): libgcrypt-1.8.2-8.39.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): libgcrypt-1.8.2-8.39.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): libgcrypt-1.8.2-8.39.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): libgcrypt-1.8.2-8.39.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): libgcrypt-1.8.2-8.39.1 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): libgcrypt-1.8.2-8.39.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): libgcrypt-1.8.2-8.39.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): libgcrypt-1.8.2-8.39.1 SUSE Enterprise Storage 6 (src): libgcrypt-1.8.2-8.39.1 SUSE CaaS Platform 4.0 (src): libgcrypt-1.8.2-8.39.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2021:2156-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1187212 CVE References: CVE-2021-33560 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): libgcrypt-1.6.1-16.77.1 SUSE OpenStack Cloud Crowbar 8 (src): libgcrypt-1.6.1-16.77.1 SUSE OpenStack Cloud 9 (src): libgcrypt-1.6.1-16.77.1 SUSE OpenStack Cloud 8 (src): libgcrypt-1.6.1-16.77.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): libgcrypt-1.6.1-16.77.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): libgcrypt-1.6.1-16.77.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): libgcrypt-1.6.1-16.77.1 SUSE Linux Enterprise Server 12-SP5 (src): libgcrypt-1.6.1-16.77.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): libgcrypt-1.6.1-16.77.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): libgcrypt-1.6.1-16.77.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): libgcrypt-1.6.1-16.77.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): libgcrypt-1.6.1-16.77.1 HPE Helion Openstack 8 (src): libgcrypt-1.6.1-16.77.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2021:2157-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1187212 CVE References: CVE-2021-33560 JIRA References: Sources used: openSUSE Leap 15.3 (src): libgcrypt-1.8.2-8.39.1
released