<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">This update fixes  two security vulnerabilities (CVE-2014-3591,CVE-2015-0837)</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:1503-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-08-26T15:36:05Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-08-26T15:36:05Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-08-26T15:36:05Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">This update fixes  two security vulnerabilities (CVE-2014-3591,CVE-2015-0837)</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update fixes two security vulnerabilities (bsc#920057):

  * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
    See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
  * Fixed data-dependent timing variations in modular exponentiation
    [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
    are Practical]
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2015-09/msg00005.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:1503-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="libgcrypt-1.5.4-2.8.1">
      <FullProductName ProductID="libgcrypt-1.5.4-2.8.1">libgcrypt-1.5.4-2.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgcrypt-devel-1.5.4-2.8.1">
      <FullProductName ProductID="libgcrypt-devel-1.5.4-2.8.1">libgcrypt-devel-1.5.4-2.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgcrypt-devel-32bit-1.5.4-2.8.1">
      <FullProductName ProductID="libgcrypt-devel-32bit-1.5.4-2.8.1">libgcrypt-devel-32bit-1.5.4-2.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgcrypt11-1.5.4-2.8.1">
      <FullProductName ProductID="libgcrypt11-1.5.4-2.8.1">libgcrypt11-1.5.4-2.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgcrypt11-32bit-1.5.4-2.8.1">
      <FullProductName ProductID="libgcrypt11-32bit-1.5.4-2.8.1">libgcrypt11-32bit-1.5.4-2.8.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.</Note>
    </Notes>
    <CVE>CVE-2014-3591</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:A/AC:H/Au:S/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-09/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3591.html</URL>
        <Description>CVE-2014-3591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920057</URL>
        <Description>SUSE Bug 920057</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/949135</URL>
        <Description>SUSE Bug 949135</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."</Note>
    </Notes>
    <CVE>CVE-2015-0837</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-09/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0837.html</URL>
        <Description>CVE-2015-0837</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920057</URL>
        <Description>SUSE Bug 920057</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
