Updated opensc_etc packages fix security vulnerability
Publication date: 30 Oct 2017Modification date: 30 Oct 2017
Type: security
Affected Mageia releases : 6
CVE: CVE-2017-15361
Description
A vulnerability, dubbed ROCA, was identified in an implementation of RSA key generation due to a fault in a code library developed by Infineon Technologies. The affected encryption keys are used to secure many forms of technology, such as hardware chips, authentication tokens, software packages, electronic documents, TLS/HTTPS keys, and PGP. Infineon Technologies’ smartcards, security tokens, and secure hardware chips produced since 2012 use the affected code library. Successful exploitation of this vulnerability results in an attacker being able to derive a private key from the public key, using prime factorization, within a practical time frame. This vulnerability does not affect the RSA encryption algorithm itself, and only affects the implementation of the RSA encryption by Infineon Technologies. This vulnerability also affects Estonian ID cards that were issued after 16th October 2014. With the updated packages the user is able to update his/her certificates and continue using the online services that require ID card.
References
SRPMS
6/core
- opensc-0.15.0-2.1.mga6
- libdigidocpp-3.13.2-1.mga6
- qdigidoc-3.13.3-1.mga6
- qesteidutil-3.12.7-2.mga6
- chrome-token-signing-1.0.6-1.mga6
- task-esteid-3.13.3-1.mga6