Debian has issued an advisory on May 2: https://www.debian.org/security/2016/dsa-3565 It addresses two issues that we didn't address in our previous update in Bug 17737.
LWN reference for CVE-2016-2849: http://lwn.net/Vulnerabilities/681390/
CC: (none) => oeWhiteboard: (none) => MGA5TOO
Assigning to maintainer
CC: (none) => marja11Assignee: bugsquad => shlomif
Patched packages uploaded for Mageia 5 and Cauldron. Testing ideas in Bug 17737. Advisory: ======================== Updated botan packages fix security vulnerabilities: During RSA decryption, how long decoding of PKCS #1 v1.5 padding took was input dependent. If these differences could be measured by an attacker, it could be used to mount a Bleichenbacher million-message attack (CVE-2015-7827). ECDSA (and DSA) signature algorithms perform a modular inverse on the signature nonce k. The modular inverse algorithm used had input dependent loops, and it is possible a side channel attack could recover sufficient information about the nonce to eventually recover the ECDSA secret key (CVE-2016-2849). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7827 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2849 https://botan.randombit.net/security.html https://www.debian.org/security/2016/dsa-3565 ======================== Updated packages in core/updates_testing: ======================== libbotan1-1.10.12-1.1.mga5 libbotan-devel-1.10.12-1.1.mga5 libbotan-static-devel-1.10.12-1.1.mga5 from botan-1.10.12-1.1.mga5.src.rpm
CC: (none) => shlomifVersion: Cauldron => 5Assignee: shlomif => qa-bugsWhiteboard: MGA5TOO => has_procedure
Advisory added in SVN. Perhaps someone could check the formatting.
Whiteboard: has_procedure => has_procedure advisory
mtn genkey works fine on mga5 x86-64 with the new botan. Can I mark it as OK?
marking as mga5-64-ok
Whiteboard: has_procedure advisory => has_procedure advisory MGA5-64-OK
And works fine on an i586 VM.
Whiteboard: has_procedure advisory MGA5-64-OK => has_procedure advisory MGA5-64-OK MGA5-32-OK
Keywords: (none) => validated_updateCC: (none) => davidwhodgins, sysadmin-bugs
An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0208.html
Status: NEW => RESOLVEDResolution: (none) => FIXED