Univention Bugzilla – Bug 44857
libgcrypt20: Multiple issues (4.2)
Last modified: 2018-04-18 14:15:52 CEST
Upstream Debian package version 1.6.3-2+deb8u3 fixes: * In Libgcrypt before 1.7.7, an attacker who learns the EdDSA session key (from side-channel observation during the signing process) can easily recover the long-term secret key. 1.7.7 makes a cipher/ecc-eddsa.c change to store this session key in secure memory, to ensure that constant-time point operations are used in the MPI library. (CVE-2017-9526)
Upstream Debian package version 1.6.3-2+deb8u4 fixes: * local side-channel attack allowing full key recovery for RSA-1024 (CVE-2017-7526)
The libgcrypt20 version in Debian Jessie is not affected by CVE-2017-0379.
Mass-import from Debian-Security: python -m univention.repong.^Cbmirror -s jessie -r 4.2-3 --override=$HOME/REPOS/repo-ng/mirror/update_ucs42_mirror_from_debian.yml --errata=doc/errata --sql --process=ALL -vvvv --now=201801211553 YAML: git:bd6159834a..449aa5a7cf
Verified: * Upstream binary imported into errata4.2-3 * No additional UCS patches in 4.2 * Package update: Ok * Advisory: Ok
<http://errata.software-univention.de/ucs/4.2/337.html>