[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1dRkts-0006cW-6U@master.debian.org>
Date: Sun, 02 Jul 2017 19:51:20 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3901-1] libgcrypt20 security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3901-1 security@...ian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 02, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libgcrypt20
CVE ID : CVE-2017-7526
Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot
Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal and
Yuval Yarom discovered that Libgcrypt is prone to a local side-channel
attack allowing full key recovery for RSA-1024.
See https://eprint.iacr.org/2017/627 for details.
For the oldstable distribution (jessie), this problem has been fixed
in version 1.6.3-2+deb8u4.
For the stable distribution (stretch), this problem has been fixed in
version 1.7.6-2+deb9u1.
For the testing distribution (buster), this problem has been fixed
in version 1.7.8-1.
For the unstable distribution (sid), this problem has been fixed in
version 1.7.8-1.
We recommend that you upgrade your libgcrypt20 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----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=/ZAS
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists