Summary: | <dev-libs/libgcrypt-1.6.4: RSA-CRT key leakage | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Hanno Böck <hanno> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | crypto+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | A4 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 567382 | ||
Bug Blocks: |
Description
Hanno Böck
![]() I'm tempted to call this security hardening rather than a vulnerability myself, although I agree the research paper is interesting. Just bumped package in tree and tested it successfully on my laptop for some common gnupg operations; but should give it some time in tree before stabilizing as usability/stability thrums this security issue/hardening matter. https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=dff004521fdfbbaff54cdba48f4bc0a51d402fb1 @crypto, 1.6.5 is current stable, but is 1.5.x affected by this? (In reply to Aaron Bauman from comment #2) > @crypto, 1.6.5 is current stable, but is 1.5.x affected by this? 1.5 is EOL , removal is tracked in bug 567382 This issue was resolved and addressed in GLSA 201610-04 at https://security.gentoo.org/glsa/201610-04 by GLSA coordinator Kristian Fiskerstrand (K_F). |