libgcrypt security update

2013-10-24T16:06:22
ID CESA-2013:1457
Type centos
Reporter CentOS Project
Modified 2013-10-25T14:03:32

Description

CentOS Errata and Security Advisory CESA-2013:1457

The libgcrypt library provides general-purpose implementations of various cryptographic algorithms.

It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload cache side-channel attack on the RSA secret exponent. An attacker able to execute a process on the logical CPU that shared the L3 cache with the GnuPG process (such as a different local user or a user of a KVM guest running on the same host with the kernel same-page merging functionality enabled) could possibly use this flaw to obtain portions of the RSA secret key. (CVE-2013-4242)

All libgcrypt users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.

Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2013-October/032026.html http://lists.centos.org/pipermail/centos-announce/2013-October/032030.html

Affected packages: libgcrypt libgcrypt-devel

Upstream details at: https://rhn.redhat.com/errata/RHSA-2013-1457.html