You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa libgcrypt

Sigurnosni nedostatak programskog paketa libgcrypt

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2896-1
February 15, 2016

libgcrypt11, libgcrypt20 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 15.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

Libgcrypt could be made to expose sensitive information.

Software Description:
– libgcrypt20: LGPL Crypto library
– libgcrypt11: LGPL Crypto library

Details:

Daniel Genkin, Lev Pachmanov, Itamar Pipman and Eran Tromer discovered
that Libgcrypt was susceptible to an attack via physical side channels. A
local attacker could use this attack to possibly recover private keys.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
libgcrypt20 1.6.3-2ubuntu1.1

Ubuntu 14.04 LTS:
libgcrypt11 1.5.3-2ubuntu4.3

Ubuntu 12.04 LTS:
libgcrypt11 1.5.0-3ubuntu0.5

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2896-1
CVE-2015-7511

Package Information:
https://launchpad.net/ubuntu/+source/libgcrypt20/1.6.3-2ubuntu1.1
https://launchpad.net/ubuntu/+source/libgcrypt11/1.5.3-2ubuntu4.3
https://launchpad.net/ubuntu/+source/libgcrypt11/1.5.0-3ubuntu0.5

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=FsC+
—–END PGP SIGNATURE—–

AutorMarko Stanec
Cert idNCERT-REF-2016-02-0015-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa gtk

Otkriven je sigurnosni nedostatak u programskom paketu gtk+2.0 i gtk+3.0 za operacijski sustav Ubuntu. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje...

Close