dev-libs/libgcrypt Available versions: (11) ~1.5.4-r101(11/11) (0) 1.5.5(0/11) 1.6.3-r4(0/20) ~1.6.3-r5(0/20) ~1.6.4(0/20) 1.6.5(0/20){tbz2} ~1.7.0(0/20) {doc static-libs +threads ABI_MIPS="n32 n64 o32" ABI_PPC="32 64" ABI_S390="32 64" ABI_X86="32 64 x32"} Installed versions: 1.6.5{tbz2}(09:30:23 AM 04/15/2016)(threads -doc -static-libs ABI_MIPS="-n32 -n64 -o32" ABI_PPC="-32 -64" ABI_S390="-32 -64" ABI_X86="64 -32 -x32") Homepage: http://www.gnupg.org/ Description: General purpose crypto library based on the code used in GnuPG #### #### app-crypt/gnupg Available versions: 1.4.19 (~)1.4.20{tbz2} [m]2.0.26-r3 [m]2.0.28 [m]~2.0.29-r1 [m]~2.0.30 ~2.1.11-r1 ~2.1.12 {bzip2 curl doc +gnutls ldap mta nls readline selinux smartcard static tofu tools usb zlib} Installed versions: 1.4.20{tbz2}(08:51:06 AM 04/15/2016)(bzip2 curl nls readline usb zlib -ldap -mta -selinux -smartcard -static) Homepage: http://www.gnupg.org/ Description: The GNU Privacy Guard, a GPL OpenPGP implementation #### #### GLSA Summary report for host pluto.xxx.xxx (Command was: /usr/lib/python-exec/python3.4/glsa-check --mail --quiet --nocolor affected) 201606-04 [N] GnuPG: Multiple vulnerabilities ( dev-libs/libgcrypt app-crypt/gnupg ) GLSA 201606-04: GnuPG: Multiple vulnerabilities ============================================================================ Synopsis: Multiple vulnerabilities have been found in GnuPG and libgcrypt, the worst of which may allow a local attacker to obtain confidential key information. Announced on: June 05, 2016 Last revised on: June 05, 2016 : 01 Affected package: dev-libs/libgcrypt Affected archs: All Vulnerable: <1.6.3-r4 Unaffected: >=1.6.3-r4 Affected package: app-crypt/gnupg Affected archs: All Vulnerable: <2.0.26-r3 Unaffected: >=2.0.26-r3, >=~1.4.19 Related bugs: 534110, 541564, 541568 Background: The GNU Privacy Guard, GnuPG, is a free replacement for the PGP suite of cryptographic software. Description: Multiple vulnerabilities have been discovered in GnuPG and libgcrypt, please review the CVE identifiers referenced below for details. Impact: A local attacker could possibly cause a Denial of Service condition. Side-channel attacks could be leveraged to obtain key material. Workaround: There is no known workaround at this time. Resolution: All GnuPG 2 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-2.0.26-r3" All GnuPG 1 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.19" All libgcrypt users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/libgcrypt-1.6.3-r4" References: CVE-2014-3591: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3591 CVE-2015-0837: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0837
Thank you for the report. commit 4b6aa5109b7bdbb37436049eff6d360a2df8ee96 Author: Kristian Fiskerstrand <k_f@gentoo.org> Date: Fri Jun 10 20:10:39 2016 +0200 GLSA 201606-04: Fix false report for gnupg 1.4 series Adding forward gnupg 1.4 versions due to lower slot since it cause false vulnerability reports. Gentoo-Bug: 585382