DSA-3901-1 libgcrypt20 -- security update

Related Vulnerabilities: CVE-2017-7526  

Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal and Yuval Yarom discovered that Libgcrypt is prone to a local side-channel attack allowing full key recovery for RSA-1024. See https://eprint.iacr.org/2017/627 for details. For the oldstable distribution (jessie), this problem has been fixed in version 1.6.3-2+deb8u4. For the stable distribution (stretch), this problem has been fixed in version 1.7.6-2+deb9u1. For the testing distribution (buster), this problem has been fixed in version 1.7.8-1. For the unstable distribution (sid), this problem has been fixed in version 1.7.8-1. We recommend that you upgrade your libgcrypt20 packages.

Debian Security Advisory

DSA-3901-1 libgcrypt20 -- security update

Date Reported:
02 Jul 2017
Affected Packages:
libgcrypt20
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2017-7526.
More information:

Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal and Yuval Yarom discovered that Libgcrypt is prone to a local side-channel attack allowing full key recovery for RSA-1024.

See https://eprint.iacr.org/2017/627 for details.

For the oldstable distribution (jessie), this problem has been fixed in version 1.6.3-2+deb8u4.

For the stable distribution (stretch), this problem has been fixed in version 1.7.6-2+deb9u1.

For the testing distribution (buster), this problem has been fixed in version 1.7.8-1.

For the unstable distribution (sid), this problem has been fixed in version 1.7.8-1.

We recommend that you upgrade your libgcrypt20 packages.