[SECURITY] [DSA 3901-1] libgcrypt20 security update

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3901-1                   security@xxxxxxxxxx
https://www.debian.org/security/                     Salvatore Bonaccorso
July 02, 2017                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libgcrypt20
CVE ID         : CVE-2017-7526

Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot
Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal and
Yuval Yarom discovered that Libgcrypt is prone to a local side-channel
attack allowing full key recovery for RSA-1024.

See https://eprint.iacr.org/2017/627 for details.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.6.3-2+deb8u4.

For the stable distribution (stretch), this problem has been fixed in
version 1.7.6-2+deb9u1.

For the testing distribution (buster), this problem has been fixed
in version 1.7.8-1.

For the unstable distribution (sid), this problem has been fixed in
version 1.7.8-1.

We recommend that you upgrade your libgcrypt20 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
-----BEGIN PGP SIGNATURE-----
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=/ZAS
-----END PGP SIGNATURE-----




[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux