From ${URL} Noteworthy changes in version 1.6.3 =================================== * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591]. See http://www.cs.tau.ac.il/~tromer/radioexp/ for details. * Fixed data-dependent timing variations in modular exponentiation [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks are Practical]. ## + 27 Feb 2015; Kristian Fiskerstrand <k_f@gentoo.org> +libgcrypt-1.6.3.ebuild: + New upstream release, security fix for two side channel attacks: + CVE-2014-3591,CVE-2015-0837
New GLSA Request filed. Maintainer(s), please drop the vulnerable version(s).
Arches and Maintainer(s), Thank you for your work.
Sadly this is not yet fixed in 1.5 branch and there are other outstanding bugs blocking removal.
I see that fix for one of them was backported last week in 1.5 branch after all 1 Noteworthy changes in version 1.5.5 (2016-02-18) [C19/A8/R4] 2 ------------------------------------------------ 3 4 * Mitigate chosen cipher text attacks on ECDH with Weierstrass 5 curves. [CVE-2015-7511] 6 7 * Use ciphertext blinding for Elgamal decryption. [CVE-2014-3591] Will look into bumping later
commit af07eccb7f03618e3ca39e525696f01222a8a009 Author: Kristian Fiskerstrand <k_f@gentoo.org> Date: Sun May 22 21:41:39 2016 +0200 dev-libs/libgcrypt: Cleanup of vulnerable 1.5 versions Gentoo-Bug: 541564 -- the libgcrypt 1.5 branch is EOL for security fixes YE2016, applications should migrate to 1.6 API within this time. Removal of 1.5 branch is tracked in bug 567382 Package-Manager: portage-2.3.0_rc1
This issue was resolved and addressed in GLSA 201606-04 at https://security.gentoo.org/glsa/201606-04 by GLSA coordinator Yury German (BlueKnight)
This issue was resolved and addressed in GLSA 201610-04 at https://security.gentoo.org/glsa/201610-04 by GLSA coordinator Kristian Fiskerstrand (K_F).