SUSE-SU-2018:2452-1: moderate: Security update for libgcrypt

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Mon Aug 20 07:26:24 MDT 2018


   SUSE Security Update: Security update for libgcrypt
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:2452-1
Rating:             moderate
References:         #1064455 #1090766 #1097410 
Cross-References:   CVE-2018-0495
Affected Products:
                    SUSE CaaS Platform 3.0
______________________________________________________________________________

   An update that solves one vulnerability and has two fixes
   is now available.

Description:

   This update for libgcrypt fixes the following issues:

   The following security vulnerability was addressed:

   - CVE-2018-0495: Mitigate a novel side-channel attack by enabling blinding
     for ECDSA signatures (bsc#1097410).

   The following other issues were fixed:

   - Extended the fipsdrv dsa-sign and dsa-verify commands with the
     --algo parameter for the FIPS testing of DSA SigVer and SigGen
      (bsc#1064455).
   - Ensure libgcrypt20-hmac and libgcrypt20 are installed in the correct
     order. (bsc#1090766)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE CaaS Platform 3.0:

      To install this update, use the SUSE CaaS Platform Velum dashboard.
      It will inform you if it detects new updates and let you then trigger
      updating of the complete cluster in a controlled way.



Package List:

   - SUSE CaaS Platform 3.0 (x86_64):

      libgcrypt-debugsource-1.6.1-16.61.1
      libgcrypt20-1.6.1-16.61.1
      libgcrypt20-debuginfo-1.6.1-16.61.1


References:

   https://www.suse.com/security/cve/CVE-2018-0495.html
   https://bugzilla.suse.com/1064455
   https://bugzilla.suse.com/1090766
   https://bugzilla.suse.com/1097410



More information about the sle-security-updates mailing list