Upstream information

CVE-2017-9526 at MITRE

Description

In Libgcrypt before 1.7.7, an attacker who learns the EdDSA session key (from side-channel observation during the signing process) can easily recover the long-term secret key. 1.7.7 makes a cipher/ecc-eddsa.c change to store this session key in secure memory, to ensure that constant-time point operations are used in the MPI library.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database SUSE
Base Score 4.3 2.6
Vector AV:N/AC:M/Au:N/C:P/I:N/A:N AV:L/AC:H/Au:N/C:P/I:P/A:N
Access Vector Network Local
Access Complexity Medium High
Authentication None None
Confidentiality Impact Partial Partial
Integrity Impact None Partial
Availability Impact None None
CVSS v3 Scores
  National Vulnerability Database SUSE
Base Score 5.9 3.6
Vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N AV:P/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
Access Vector Network Physical
Access Complexity High High
Privileges Required None None
User Interaction None None
Scope Unchanged Changed
Confidentiality Impact High Low
Integrity Impact None Low
Availability Impact None None
SUSE Bugzilla entries: 1042326 [RESOLVED], 1043777 [RESOLVED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Openstack Cloud Magnum Orchestration 7
  • libgcrypt >= 1.6.1-16.39.1
  • libgcrypt20 >= 1.6.1-16.39.1
Patchnames:
SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-985
SUSE Linux Enterprise Desktop 12 SP2
  • libgcrypt >= 1.6.1-16.39.1
  • libgcrypt20 >= 1.6.1-16.39.1
  • libgcrypt20-32bit >= 1.6.1-16.39.1
Patchnames:
SUSE-SLE-DESKTOP-12-SP2-2017-985
SUSE Linux Enterprise Server 12 SP2
  • libgcrypt >= 1.6.1-16.39.1
  • libgcrypt20 >= 1.6.1-16.39.1
  • libgcrypt20-32bit >= 1.6.1-16.39.1
  • libgcrypt20-hmac >= 1.6.1-16.39.1
  • libgcrypt20-hmac-32bit >= 1.6.1-16.39.1
Patchnames:
SUSE-SLE-SERVER-12-SP2-2017-985
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • libgcrypt >= 1.6.1-16.39.1
  • libgcrypt20 >= 1.6.1-16.39.1
  • libgcrypt20-hmac >= 1.6.1-16.39.1
Patchnames:
SUSE-SLE-RPI-12-SP2-2017-985
SUSE Linux Enterprise Software Development Kit 12 SP2
  • libgcrypt >= 1.6.1-16.39.1
  • libgcrypt-devel >= 1.6.1-16.39.1
Patchnames:
SUSE-SLE-SDK-12-SP2-2017-985
openSUSE Leap 42.2
  • libgcrypt >= 1.6.1-34.3.1
  • libgcrypt-cavs >= 1.6.1-34.3.1
  • libgcrypt-cavs-debuginfo >= 1.6.1-34.3.1
  • libgcrypt-debugsource >= 1.6.1-34.3.1
  • libgcrypt-devel >= 1.6.1-34.3.1
  • libgcrypt-devel-32bit >= 1.6.1-34.3.1
  • libgcrypt-devel-debuginfo >= 1.6.1-34.3.1
  • libgcrypt-devel-debuginfo-32bit >= 1.6.1-34.3.1
  • libgcrypt20 >= 1.6.1-34.3.1
  • libgcrypt20-32bit >= 1.6.1-34.3.1
  • libgcrypt20-debuginfo >= 1.6.1-34.3.1
  • libgcrypt20-debuginfo-32bit >= 1.6.1-34.3.1
  • libgcrypt20-hmac >= 1.6.1-34.3.1
  • libgcrypt20-hmac-32bit >= 1.6.1-34.3.1
Patchnames:
openSUSE-2017-743


Status of this issue by product and package

Product(s) Source package State
OpenStack Cloud Magnum Orchestration 7.0 libgcrypt Released
SUSE Linux Enterprise Desktop 12 SP1 libgcrypt Affected
SUSE Linux Enterprise Desktop 12 SP2 libgcrypt Released
SUSE Linux Enterprise Module for Legacy Software 12 compat-libgcrypt11 Not affected
SUSE Linux Enterprise SDK 11 SP4 libgcrypt Not affected
SUSE Linux Enterprise SDK 12 SP1 libgcrypt Affected
SUSE Linux Enterprise SDK 12 SP2 libgcrypt Released
SUSE Linux Enterprise Server 11 SP3 LTSS libgcrypt Not affected
SUSE Linux Enterprise Server 11 SP4 libgcrypt Not affected
SUSE Linux Enterprise Server 12 GA libgcrypt Affected
SUSE Linux Enterprise Server 12 SP1 libgcrypt Affected
SUSE Linux Enterprise Server 12 SP2 libgcrypt Released
SUSE Linux Enterprise Server 12 SP2 for Raspberry Pi libgcrypt Released