[manjaro-security] [arch-security] [ASA-201709-14] lib32-libgcrypt: private key recovery
Levente Polyak
anthraxx at archlinux.org
Mon Sep 18 16:38:39 CEST 2017
Arch Linux Security Advisory ASA-201709-14
==========================================
Severity: Medium
Date : 2017-09-18
CVE-ID : CVE-2017-0379
Package : lib32-libgcrypt
Type : private key recovery
Remote : No
Link : https://security.archlinux.org/AVG-403
Summary
=======
The package lib32-libgcrypt before version 1.8.1-1 is vulnerable to
private key recovery.
Resolution
==========
Upgrade to 1.8.1-1.
# pacman -Syu "lib32-libgcrypt>=1.8.1-1"
The problem has been fixed upstream in version 1.8.1.
Workaround
==========
None.
Description
===========
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-
channel attacks, which makes it easier for attackers to discover a
secret key, related to cipher/ecc.c and mpi/ec.c. On multi user systems
or on boxes with virtual machines this attack may be used to steal
private keys.
Impact
======
On a multi user system or on boxes with virtual machines a local
attacker may be able to perform a side-channel attack to steal private
keys.
References
==========
https://lists.gnupg.org/pipermail/gnupg-announce/2017q3/000414.html
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=bf76acbf0da6b0f245e491bec12c0f0a1b5be7c9
https://eprint.iacr.org/2017/806
https://security.archlinux.org/CVE-2017-0379
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 866 bytes
Desc: OpenPGP digital signature
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20170918/439d237f/attachment.sig>
More information about the manjaro-security
mailing list