<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libgcrypt</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:1596-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-09-14T13:39:48Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-09-14T13:39:48Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-09-14T13:39:48Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libgcrypt</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">libgcrypt was updated to include countermeasures against Lenstra's fault attack on RSA Chinese Remainder Theorem optimization in RSA.

A signature verification step was updated to protect against leaks of private keys in case of hardware faults or implementation errors in numeric libraries.

GnuPG already performed this check by itself and was not affected. This fix is equivalent, but not equal to CVE-2015-5738</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2015-09/msg00033.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:1596-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="libgcrypt-1.5.4-2.12.1">
      <FullProductName ProductID="libgcrypt-1.5.4-2.12.1">libgcrypt-1.5.4-2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgcrypt-devel-1.5.4-2.12.1">
      <FullProductName ProductID="libgcrypt-devel-1.5.4-2.12.1">libgcrypt-devel-1.5.4-2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgcrypt-devel-32bit-1.5.4-2.12.1">
      <FullProductName ProductID="libgcrypt-devel-32bit-1.5.4-2.12.1">libgcrypt-devel-32bit-1.5.4-2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgcrypt11-1.5.4-2.12.1">
      <FullProductName ProductID="libgcrypt11-1.5.4-2.12.1">libgcrypt11-1.5.4-2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgcrypt11-32bit-1.5.4-2.12.1">
      <FullProductName ProductID="libgcrypt11-32bit-1.5.4-2.12.1">libgcrypt11-32bit-1.5.4-2.12.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x, when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS), makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack.</Note>
    </Notes>
    <CVE>CVE-2015-5738</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-09/msg00033.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5738.html</URL>
        <Description>CVE-2015-5738</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944456</URL>
        <Description>SUSE Bug 944456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944835</URL>
        <Description>SUSE Bug 944835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944836</URL>
        <Description>SUSE Bug 944836</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
