<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libgcrypt-cavs-1.7.3-1.3 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10037</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libgcrypt-cavs-1.7.3-1.3 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libgcrypt-cavs-1.7.3-1.3 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10037</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10037</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4242/</URL>
      <Description>SUSE CVE CVE-2013-4242 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3591/</URL>
      <Description>SUSE CVE CVE-2014-3591 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0837/</URL>
      <Description>SUSE CVE CVE-2015-0837 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5738/</URL>
      <Description>SUSE CVE CVE-2015-5738 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7511/</URL>
      <Description>SUSE CVE CVE-2015-7511 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6313/</URL>
      <Description>SUSE CVE CVE-2016-6313 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libgcrypt-cavs-1.7.3-1.3">
      <FullProductName ProductID="libgcrypt-cavs-1.7.3-1.3">libgcrypt-cavs-1.7.3-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgcrypt-devel-1.7.3-1.3">
      <FullProductName ProductID="libgcrypt-devel-1.7.3-1.3">libgcrypt-devel-1.7.3-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgcrypt-devel-32bit-1.7.3-1.3">
      <FullProductName ProductID="libgcrypt-devel-32bit-1.7.3-1.3">libgcrypt-devel-32bit-1.7.3-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgcrypt20-1.7.3-1.3">
      <FullProductName ProductID="libgcrypt20-1.7.3-1.3">libgcrypt20-1.7.3-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgcrypt20-32bit-1.7.3-1.3">
      <FullProductName ProductID="libgcrypt20-32bit-1.7.3-1.3">libgcrypt20-32bit-1.7.3-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgcrypt20-hmac-1.7.3-1.3">
      <FullProductName ProductID="libgcrypt20-hmac-1.7.3-1.3">libgcrypt20-hmac-1.7.3-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgcrypt20-hmac-32bit-1.7.3-1.3">
      <FullProductName ProductID="libgcrypt20-hmac-32bit-1.7.3-1.3">libgcrypt20-hmac-32bit-1.7.3-1.3</FullProductName>
    </Branch>
    <Relationship ProductReference="libgcrypt-cavs-1.7.3-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3">libgcrypt-cavs-1.7.3-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgcrypt-devel-1.7.3-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3">libgcrypt-devel-1.7.3-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgcrypt-devel-32bit-1.7.3-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3">libgcrypt-devel-32bit-1.7.3-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgcrypt20-1.7.3-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3">libgcrypt20-1.7.3-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgcrypt20-32bit-1.7.3-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3">libgcrypt20-32bit-1.7.3-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgcrypt20-hmac-1.7.3-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3">libgcrypt20-hmac-1.7.3-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgcrypt20-hmac-32bit-1.7.3-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3">libgcrypt20-hmac-32bit-1.7.3-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.</Note>
    </Notes>
    <CVE>CVE-2013-4242</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4242.html</URL>
        <Description>CVE-2013-4242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831359</URL>
        <Description>SUSE Bug 831359</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.</Note>
    </Notes>
    <CVE>CVE-2014-3591</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:A/AC:H/Au:S/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3591.html</URL>
        <Description>CVE-2014-3591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920057</URL>
        <Description>SUSE Bug 920057</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/949135</URL>
        <Description>SUSE Bug 949135</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."</Note>
    </Notes>
    <CVE>CVE-2015-0837</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0837.html</URL>
        <Description>CVE-2015-0837</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920057</URL>
        <Description>SUSE Bug 920057</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x, when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS), makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack.</Note>
    </Notes>
    <CVE>CVE-2015-5738</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5738.html</URL>
        <Description>CVE-2015-5738</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944456</URL>
        <Description>SUSE Bug 944456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944835</URL>
        <Description>SUSE Bug 944835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944836</URL>
        <Description>SUSE Bug 944836</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.</Note>
    </Notes>
    <CVE>CVE-2015-7511</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7511.html</URL>
        <Description>CVE-2015-7511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965902</URL>
        <Description>SUSE Bug 965902</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.</Note>
    </Notes>
    <CVE>CVE-2016-6313</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6313.html</URL>
        <Description>CVE-2016-6313</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123792</URL>
        <Description>SUSE Bug 1123792</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994157</URL>
        <Description>SUSE Bug 994157</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
