Opened 7 years ago
Closed 7 years ago
#10868 closed enhancement (fixed)
libgcrypt 1.8.3 (CVE-2018-0495)
Reported by: | Pierre Labastie | Owned by: | |
---|---|---|---|
Priority: | high | Milestone: | 8.3 |
Component: | BOOK | Version: | SVN |
Severity: | normal | Keywords: | |
Cc: |
Description ¶
New point release. Security fix:
Noteworthy changes in version 1.8.3 =================================== - Use blinding for ECDSA signing to mitigate a novel side-channel attack. [#4011,CVE-2018-0495] - Fix incorrect counter overflow handling for GCM when using an IV size other than 96 bit. [#3764] - Fix incorrect output of AES-keywrap mode for in-place encryption on some platforms. - Fix the gcry_mpi_ec_curve_point point validation function. - Fix rare assertion failure in gcry_prime_check.
Details of the security threat at https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
According to the announcement, although gnupg is a user of libgcrypt, it does not use the ECDSA code, and hence is not subject to the side channel attack.
Change History (2)
comment:1 by , 7 years ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:2 by , 7 years ago
Resolution: | → fixed |
---|---|
Status: | assigned → closed |
Note:
See TracTickets
for help on using tickets.
r20199