[USN-3689-1] Libgcrypt vulnerability


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============5251672824650491329==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”sDSiiRC5mSfuHsdJijwUqHcGN2dCO5OdQ”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–sDSiiRC5mSfuHsdJijwUqHcGN2dCO5OdQ
Content-Type: multipart/mixed; boundary=”pJUKecTUvreh87JDP0qX39UA5kCOPgTTF”;
protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: “ubuntu-security-announce@lists.ubuntu.com”

Message-ID:
Subject: [USN-3689-1] Libgcrypt vulnerability

–pJUKecTUvreh87JDP0qX39UA5kCOPgTTF
Content-Type: text/plain; charset=utf-8
Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3689-1
June 19, 2018

libgcrypt11, libgcrypt20 vulnerability
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Libgcrypt could be made to expose sensitive information.

Software Description:
– libgcrypt20: LGPL Crypto library
– libgcrypt11: LGPL Crypto library

Details:

Keegan Ryan discovered that Libgcrypt was susceptible to a side-channel
attack. A local attacker could possibly use this attack to recover ECDSA
private keys.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
libgcrypt20 1.8.1-4ubuntu1.1

Ubuntu 17.10:
libgcrypt20 1.7.8-2ubuntu1.1

Ubuntu 16.04 LTS:
libgcrypt20 1.6.5-2ubuntu0.5

Ubuntu 14.04 LTS:
libgcrypt11 1.5.3-2ubuntu4.6

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3689-1
CVE-2018-0495

Package Information:
https://launchpad.net/ubuntu/+source/libgcrypt20/1.8.1-4ubuntu1.1
https://launchpad.net/ubuntu/+source/libgcrypt20/1.7.8-2ubuntu1.1
https://launchpad.net/ubuntu/+source/libgcrypt20/1.6.5-2ubuntu0.5
https://launchpad.net/ubuntu/+source/libgcrypt11/1.5.3-2ubuntu4.6

–pJUKecTUvreh87JDP0qX39UA5kCOPgTTF–

–sDSiiRC5mSfuHsdJijwUqHcGN2dCO5OdQ
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=AVbY
—–END PGP SIGNATURE—–

–sDSiiRC5mSfuHsdJijwUqHcGN2dCO5OdQ–

–===============5251672824650491329==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============5251672824650491329==–