- -------------------------------------------------------------------------
Debian Security Advisory DSA-3901-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
July 02, 2017                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libgcrypt20
CVE ID         : CVE-2017-7526

Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot
Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal and
Yuval Yarom discovered that Libgcrypt is prone to a local side-channel
attack allowing full key recovery for RSA-1024.

See https://eprint.iacr.org/2017/627 for details.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.6.3-2+deb8u4.

For the stable distribution (stretch), this problem has been fixed in
version 1.7.6-2+deb9u1.

For the testing distribution (buster), this problem has been fixed
in version 1.7.8-1.

For the unstable distribution (sid), this problem has been fixed in
version 1.7.8-1.

We recommend that you upgrade your libgcrypt20 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-3901-1: libgcrypt20 security update

July 2, 2017
Daniel J

Summary

See https://eprint.iacr.org/2017/627 for details.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.6.3-2+deb8u4.

For the stable distribution (stretch), this problem has been fixed in
version 1.7.6-2+deb9u1.

For the testing distribution (buster), this problem has been fixed
in version 1.7.8-1.

For the unstable distribution (sid), this problem has been fixed in
version 1.7.8-1.

We recommend that you upgrade your libgcrypt20 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot
Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal and
Yuval Yarom discovered that Libgcrypt is prone to a local side-channel
attack allowing full key recovery for RSA-1024.

Related News