openSUSE-SU-2017:1700-1: moderate: Security update for libgcrypt
openSUSE Security Update: Security update for libgcrypt ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:1700-1 Rating: moderate References: #1042326 #931932 Cross-References: CVE-2017-9526 Affected Products: openSUSE Leap 42.2 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for libgcrypt fixes the following issues: - CVE-2017-9526: Store the session key in secure memory to ensure that constant time point operations are used in the MPI library. (bsc#1042326) - Don't require secure memory for the fips selftests, this prevents the "Oops, secure memory pool already initialized" warning. (bsc#931932) This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-743=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): libgcrypt-cavs-1.6.1-34.3.1 libgcrypt-cavs-debuginfo-1.6.1-34.3.1 libgcrypt-debugsource-1.6.1-34.3.1 libgcrypt-devel-1.6.1-34.3.1 libgcrypt-devel-debuginfo-1.6.1-34.3.1 libgcrypt20-1.6.1-34.3.1 libgcrypt20-debuginfo-1.6.1-34.3.1 libgcrypt20-hmac-1.6.1-34.3.1 - openSUSE Leap 42.2 (x86_64): libgcrypt-devel-32bit-1.6.1-34.3.1 libgcrypt-devel-debuginfo-32bit-1.6.1-34.3.1 libgcrypt20-32bit-1.6.1-34.3.1 libgcrypt20-debuginfo-32bit-1.6.1-34.3.1 libgcrypt20-hmac-32bit-1.6.1-34.3.1 References: https://www.suse.com/security/cve/CVE-2017-9526.html https://bugzilla.suse.com/1042326 https://bugzilla.suse.com/931932
participants (1)
-
opensuse-security@opensuse.org