diff --git a/libgcrypt-1.7.6.tar.bz2 b/libgcrypt-1.7.6.tar.bz2 deleted file mode 100644 index 0859c6a..0000000 --- a/libgcrypt-1.7.6.tar.bz2 +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:626aafee84af9d2ce253d2c143dc1c0902dda045780cc241f39970fc60be05bc -size 2897695 diff --git a/libgcrypt-1.7.6.tar.bz2.sig b/libgcrypt-1.7.6.tar.bz2.sig deleted file mode 100644 index cf8de2f..0000000 Binary files a/libgcrypt-1.7.6.tar.bz2.sig and /dev/null differ diff --git a/libgcrypt-1.7.7.tar.bz2 b/libgcrypt-1.7.7.tar.bz2 new file mode 100644 index 0000000..2da4818 --- /dev/null +++ b/libgcrypt-1.7.7.tar.bz2 @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:b9b85eba0793ea3e6e66b896eb031fa05e1a4517277cc9ab10816b359254cd9a +size 2861190 diff --git a/libgcrypt-1.7.7.tar.bz2.sig b/libgcrypt-1.7.7.tar.bz2.sig new file mode 100644 index 0000000..3000b23 Binary files /dev/null and b/libgcrypt-1.7.7.tar.bz2.sig differ diff --git a/libgcrypt-secure-EdDSA-session-key.patch b/libgcrypt-secure-EdDSA-session-key.patch deleted file mode 100644 index 6bc892a..0000000 --- a/libgcrypt-secure-EdDSA-session-key.patch +++ /dev/null @@ -1,34 +0,0 @@ -From 5a22de904a0a366ae79f03ff1e13a1232a89e26b Mon Sep 17 00:00:00 2001 -From: Jo Van Bulck -Date: Thu, 19 Jan 2017 17:00:15 +0100 -Subject: [PATCH] ecc: Store EdDSA session key in secure memory. - -* cipher/ecc-eddsa.c (_gcry_ecc_eddsa_sign): use mpi_snew to allocate -session key. --- - -An attacker who learns the EdDSA session key from side-channel -observation during the signing process, can easily revover the long- -term secret key. Storing the session key in secure memory ensures that -constant time point operations are used in the MPI library. - -Signed-off-by: Jo Van Bulck ---- - cipher/ecc-eddsa.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/cipher/ecc-eddsa.c b/cipher/ecc-eddsa.c -index f91f848..813e030 100644 ---- a/cipher/ecc-eddsa.c -+++ b/cipher/ecc-eddsa.c -@@ -603,7 +603,7 @@ _gcry_ecc_eddsa_sign (gcry_mpi_t input, ECC_secret_key *skey, - a = mpi_snew (0); - x = mpi_new (0); - y = mpi_new (0); -- r = mpi_new (0); -+ r = mpi_snew (0); - ctx = _gcry_mpi_ec_p_internal_new (skey->E.model, skey->E.dialect, 0, - skey->E.p, skey->E.a, skey->E.b); - b = (ctx->nbits+7)/8; --- -2.8.0.rc3 diff --git a/libgcrypt.changes b/libgcrypt.changes index a733d2c..427def0 100644 --- a/libgcrypt.changes +++ b/libgcrypt.changes @@ -1,3 +1,12 @@ +------------------------------------------------------------------- +Sun Jun 4 19:26:12 UTC 2017 - astieger@suse.com + +- libgcrypt 1.7.7: + * Fix possible timing attack on EdDSA session key (previously + patched, drop libgcrypt-secure-EdDSA-session-key.patch) + * Fix long standing bug in secure memory implementation which + could lead to a segv on free + ------------------------------------------------------------------- Fri Jun 2 10:05:18 UTC 2017 - pmonrealgonzalez@suse.com diff --git a/libgcrypt.spec b/libgcrypt.spec index e717e63..ab7a059 100644 --- a/libgcrypt.spec +++ b/libgcrypt.spec @@ -21,7 +21,7 @@ %define libsoname %{name}20 %define cavs_dir %{_libexecdir}/%{name}/cavs Name: libgcrypt -Version: 1.7.6 +Version: 1.7.7 Release: 0 Summary: The GNU Crypto Library License: GPL-2.0+ and LGPL-2.1+ and GPL-3.0+ @@ -56,8 +56,6 @@ Patch30: drbg_test.patch #PATCH-FIX-SUSE run FIPS self-test from constructor Patch32: libgcrypt-fips_run_selftest_at_constructor.patch Patch34: libgcrypt-1.6.3-aliasing.patch -#PATCH-FIX-UPSTREAM -- pmonrealgonzalez@suse.com bsc#1042326 timing attack on EdDSA session key -Patch35: libgcrypt-secure-EdDSA-session-key.patch BuildRequires: automake >= 1.14 BuildRequires: fipscheck BuildRequires: libgpg-error-devel >= 1.13 @@ -155,7 +153,6 @@ understanding of applied cryptography is required to use Libgcrypt. %endif %patch13 -p1 %patch14 -p1 -%patch35 -p1 %build echo building with build_hmac256 set to %{build_hmac256}