From 4f2d7949f03e1c198bc888f2d05f421d35c57e21 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 9 Oct 2017 18:53:29 +0100 Subject: reinit the tree, so we can have metadata --- metadata/glsa/glsa-201402-24.xml | 91 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 91 insertions(+) create mode 100644 metadata/glsa/glsa-201402-24.xml (limited to 'metadata/glsa/glsa-201402-24.xml') diff --git a/metadata/glsa/glsa-201402-24.xml b/metadata/glsa/glsa-201402-24.xml new file mode 100644 index 000000000000..8242a94c6732 --- /dev/null +++ b/metadata/glsa/glsa-201402-24.xml @@ -0,0 +1,91 @@ + + + + GnuPG, Libgcrypt: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in GnuPG and + Libgcrypt, which may result in execution of arbitrary code, Denial of + Service, or the disclosure of private keys. + + gnupg libgcrypt + 2014-02-21 + 2016-08-24: 3 + 449546 + 478184 + 484836 + 487230 + 494658 + local, remote + + + 2.0.22 + 1.4.16 + 1.4.17 + 1.4.18 + 1.4.19 + 1.4.20 + 1.4.21 + 2.0.22 + + + 1.5.3 + 1.5.3 + + + +

The GNU Privacy Guard, GnuPG, is a free replacement for the PGP suite of + cryptographic software. Libgcrypt is a cryptographic library based on + GnuPG. +

+
+ +

Multiple vulnerabilities have been discovered in GnuPG and Libgcrypt. + Please review the CVE identifiers referenced below for details. +

+
+ +

An unauthenticated remote attacker may be able to execute arbitrary code + with the privileges of the user running GnuPG, cause a Denial of Service + condition, or bypass security restrictions. Additionally, a side-channel + attack may allow a local attacker to recover a private key, please review + “Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel + Attack” in the References section for further details. +

+
+ +

There is no known workaround at this time.

+
+ +

All GnuPG 2.0 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-2.0.22" + + +

All GnuPG 1.4 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.16" + + +

All Libgcrypt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libgcrypt-1.5.3" + + +
+ + CVE-2012-6085 + CVE-2013-4242 + CVE-2013-4351 + CVE-2013-4402 + Flush+Reload: a High + Resolution, Low Noise, L3 Cache Side-Channel Attack + + + ackle + ackle +
-- cgit v1.2.3