Bug 920057 - (CVE-2014-3591) VUL-1: CVE-2014-3591, CVE-2015-0837: libgcrypt, gpg: mitigations against side-channel attacks
(CVE-2014-3591)
VUL-1: CVE-2014-3591, CVE-2015-0837: libgcrypt, gpg: mitigations against side...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
maint:released:sle10-sp3:62265 CV...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2015-02-28 09:23 UTC by Andreas Stieger
Modified: 2016-11-29 14:01 UTC (History)
3 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2015-02-28 09:23:55 UTC
libgcrypt 1.6.3:
http://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html

GnuPG 1.4.19:
http://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html

>* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
>  See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
>
>* Fixed data-dependent timing variations in modular exponentiation
>  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
>  are Practical].

GnuPG 2.0.x (stable) got 2.0.27
GnuPG 2.1.x (modern) got 2.1.2
However these two are not directly affected but use libgcrypt.
Comment 2 Swamp Workflow Management 2015-03-01 23:00:23 UTC
bugbot adjusting priority
Comment 8 Swamp Workflow Management 2015-07-03 08:06:39 UTC
SUSE-SU-2015:1179-1: An update that solves one vulnerability and has 9 fixes is now available.

Category: security (moderate)
Bug References: 896202,896435,898003,899524,900275,900276,905483,920057,928740,929919
CVE References: CVE-2014-3591
Sources used:
SUSE Linux Enterprise Software Development Kit 12 (src):    libgcrypt-1.6.1-13.1
SUSE Linux Enterprise Server 12 (src):    libgcrypt-1.6.1-13.1
SUSE Linux Enterprise Desktop 12 (src):    libgcrypt-1.6.1-13.1
Comment 10 Bernhard Wiedemann 2015-08-14 13:00:11 UTC
This is an autogenerated message for OBS integration:
This bug (920057) was mentioned in
https://build.opensuse.org/request/show/323128 13.2+13.1 / libgcrypt
Comment 21 Swamp Workflow Management 2015-09-07 06:10:55 UTC
openSUSE-SU-2015:1503-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 920057
CVE References: CVE-2014-3591,CVE-2015-0837
Sources used:
openSUSE 13.2 (src):    libgcrypt-1.6.1-8.6.1
openSUSE 13.1 (src):    libgcrypt-1.5.4-2.8.1
Comment 22 Swamp Workflow Management 2015-09-08 15:09:55 UTC
SUSE-SU-2015:1511-1: An update that solves one vulnerability and has one errata is now available.

Category: security (moderate)
Bug References: 920057,938343
CVE References: CVE-2015-0837
Sources used:
SUSE Linux Enterprise Software Development Kit 12 (src):    libgcrypt-1.6.1-16.1
SUSE Linux Enterprise Server 12 (src):    libgcrypt-1.6.1-16.1
SUSE Linux Enterprise Desktop 12 (src):    libgcrypt-1.6.1-16.1
Comment 23 Swamp Workflow Management 2015-09-24 13:10:22 UTC
SUSE-SU-2015:1626-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 920057
CVE References: CVE-2014-3591,CVE-2015-0837
Sources used:
SUSE Linux Enterprise Software Development Kit 11-SP4 (src):    libgcrypt-1.5.0-0.19.1
SUSE Linux Enterprise Software Development Kit 11-SP3 (src):    libgcrypt-1.5.0-0.19.1
SUSE Linux Enterprise Server for VMWare 11-SP3 (src):    libgcrypt-1.5.0-0.19.1
SUSE Linux Enterprise Server 11-SP4 (src):    libgcrypt-1.5.0-0.19.1
SUSE Linux Enterprise Server 11-SP3 (src):    libgcrypt-1.5.0-0.19.1
SUSE Linux Enterprise Desktop 11-SP4 (src):    libgcrypt-1.5.0-0.19.1
SUSE Linux Enterprise Desktop 11-SP3 (src):    libgcrypt-1.5.0-0.19.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    libgcrypt-1.5.0-0.19.1
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    libgcrypt-1.5.0-0.19.1
Comment 25 Marcus Meissner 2015-12-08 16:14:35 UTC
released I think.