On 02/23/16 13:45, Antoine Jacoutot wrote: > On Tue, Feb 23, 2016 at 01:22:26PM +0000, Sevan Janiyan wrote: >> Version of security/libgcrypt is vulnerable to CVE-2015-7511 >> https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html > > Thanks. > > > Index: Makefile > =================================================================== > RCS file: /cvs/ports/security/libgcrypt/Makefile,v > retrieving revision 1.40 > diff -u -p -r1.40 Makefile > --- Makefile 9 Sep 2015 07:46:44 -0000 1.40 > +++ Makefile 23 Feb 2016 13:45:02 -0000 > @@ -2,10 +2,10 @@ > > COMMENT= crypto library based on code used in GnuPG > > -DISTNAME= libgcrypt-1.6.4 > +DISTNAME= libgcrypt-1.6.5 > CATEGORIES= security > > -SHARED_LIBS += gcrypt 19.2 # 20.4 > +SHARED_LIBS += gcrypt 19.2 # 20.5 > > HOMEPAGE= http://www.gnupg.org/ > > Index: distinfo > =================================================================== > RCS file: /cvs/ports/security/libgcrypt/distinfo,v > retrieving revision 1.18 > diff -u -p -r1.18 distinfo > --- distinfo 9 Sep 2015 07:46:44 -0000 1.18 > +++ distinfo 23 Feb 2016 13:45:02 -0000 > @@ -1,2 +1,2 @@ > -SHA256 (libgcrypt-1.6.4.tar.gz) = > XCB2ISlhcS5HdKvzLIXLWFN9VE1gFqJGT7Mng2U9G20= > -SIZE (libgcrypt-1.6.4.tar.gz) = 2970656 > +SHA256 (libgcrypt-1.6.5.tar.gz) = > ICvxCczy1hRWXISfPlaHuUzelyFns1Jh4JQlI2die8Y= > +SIZE (libgcrypt-1.6.5.tar.gz) = 2970811 > > I saw this on debian security updates just over 1 week ago,
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3478-1 secur...@debian.org https://www.debian.org/security/ Salvatore Bonaccorso February 15, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libgcrypt11 CVE ID : CVE-2015-7511 Daniel Genkin, Lev Pachmanov, Itamar Pipman and Eran Tromer discovered that the ECDH secret decryption keys in applications using the libgcrypt11 library could be leaked via a side-channel attack. See https://www.cs.tau.ac.IL/~tromer/ecdh/ for details. For the oldstable distribution (wheezy), this problem has been fixed in version 1.5.0-5+deb7u4. We recommend that you upgrade your libgcrypt11 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-annou...@lists.debian.org the question is why didn't portroach see the update, shortly after 1.6.5 was released? Does something else need changing?