Skip to content
GitLab
Projects Groups Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • aports aports
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Graph
    • Compare
  • Issues 658
    • Issues 658
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 337
    • Merge requests 337
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Releases
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • alpinealpine
  • aportsaports
  • Issues
  • #2187
Closed
Open
Issue created Aug 02, 2013 by Peter Kotcauer@kocka

libgcrypt CVE-2013-4242 GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack

references:
http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000329.html
http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html

Libgcrypt version 1.5.3.
This is a security fix release for the stable branch.

Libgcrypt is a general purpose library of cryptographic building
blocks. It is originally based on code used by GnuPG. It does not
provide any implementation of OpenPGP or other protocols. Thorough
understanding of applied cryptography is required to use Libgcrypt.

Noteworthy changes in version 1.5.3:

* Mitigate the Yarom/Falkner flush+reload side-channel attack on
RSA secret keys. See <http://eprint.iacr.org/2013/448>.

[ Note that Libgcrypt is used by GnuPG 2.x and thus this release fixes
the above problem. The fix for GnuPG < 2.0 can be found in the just
released GnuPG 1.4.14. ]

Source code is hosted at the GnuPG FTP server and its mirrors as
listed at http://www.gnupg.org/download/mirrors.html . On the primary
server the source file and its digital signatures is:

ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.5.3.tar.bz2 (1.5M)
ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.5.3.tar.bz2.sig

This file is bzip2 compressed. A gzip compressed version is also
available:

ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.5.3.tar.gz (1.8M)
ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.5.3.tar.gz.sig

Alternativley you may upgrade version 1.5.2 using this patch file:

ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.5.2-1.5.3.diff.bz2 (4k)

The SHA-1 checksums are:

2c6553cc17f2a1616d512d6870fe95edf6b0e26e libgcrypt-1.5.3.tar.bz2
184405c91d1ab4877caefb1a6458767e5f0b639e libgcrypt-1.5.3.tar.gz
b711fe3ddf534bb6f11823542036eb4a32e0c914 libgcrypt-1.5.2-1.5.3.diff.bz2

(from redmine: issue id 2187, created on 2013-08-02, closed on 2013-08-06)

  • Relations:
    • child #2188 (closed)
    • child #2189 (closed)
    • child #2190 (closed)
    • child #2191 (closed)
  • Changesets:
    • Revision b118fe90 by Natanael Copa on 2013-08-05T14:10:15Z:
main/libgcrypt: security upgrade to 1.5.3 (CVE-2013-4242)

ref #2187
fixes #2188
  • Revision d8160ad5 by Natanael Copa on 2013-08-05T14:14:03Z:
main/libgcrypt: security upgrade to 1.5.3 (CVE-2013-4242)

ref #2187
fixes #2189
  • Revision 6e323da5 by Natanael Copa on 2013-08-05T14:14:33Z:
main/libgcrypt: security upgrade to 1.5.3 (CVE-2013-4242)

ref #2187
fixes #2191
  • Revision a78dcc77 by Natanael Copa on 2013-08-05T14:15:08Z:
main/libgcrypt: security upgrade to 1.5.3 (CVE-2013-4242)

ref #2187
fixes #2190
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking