Change log for libgcrypt11 package in Ubuntu

161 of 61 results
Published in trusty-updates on 2018-06-19
Published in trusty-security on 2018-06-19
libgcrypt11 (1.5.3-2ubuntu4.6) trusty-security; urgency=medium

  * SECURITY UPDATE: memory-cache side-channel attack on ECDSA signatures
    - debian/patches/CVE-2018-0495.patch: add blinding for ECDSA in
      cipher/ecc.
    - CVE-2018-0495

 -- Marc Deslauriers <email address hidden>  Mon, 18 Jun 2018 09:40:59 -0400
Superseded in trusty-updates on 2018-06-19
Superseded in trusty-security on 2018-06-19
libgcrypt11 (1.5.3-2ubuntu4.5) trusty-security; urgency=medium

  * SECURITY UPDATE: full RSA key recovery via side-channel attack
    - debian/patches/CVE-2017-7526-1.patch: simplify loop in mpi/mpi-pow.c.
    - debian/patches/CVE-2017-7526-2.patch: use same computation for square
      and multiply in mpi/mpi-pow.c.
    - debian/patches/CVE-2017-7526-3.patch: add exponent blinding in
      cipher/rsa.c.
    - debian/patches/CVE-2017-7526-4.patch: add free to cipher/rsa.c.
    - debian/patches/CVE-2017-7526-5.patch: add free to cipher/rsa.c.
    - CVE-2017-7526

 -- Marc Deslauriers <email address hidden>  Mon, 03 Jul 2017 08:21:32 -0400
Superseded in trusty-updates on 2017-07-03
Superseded in trusty-security on 2017-07-03
libgcrypt11 (1.5.3-2ubuntu4.4) trusty-security; urgency=medium

  * SECURITY UPDATE: random number generator prediction
    - debian/patches/CVE-2016-6313-1.patch: improve the diagram showing the
      random mixing in random/random-csprng.c.
    - debian/patches/CVE-2016-6313-2.patch: hash continuous areas in the
      csprng pool in random/random-csprng.c.
    - CVE-2016-6313

 -- Marc Deslauriers <email address hidden>  Wed, 17 Aug 2016 13:39:25 -0400
Published in precise-updates on 2016-08-18
Published in precise-security on 2016-08-18
libgcrypt11 (1.5.0-3ubuntu0.6) precise-security; urgency=medium

  * SECURITY UPDATE: random number generator prediction
    - debian/patches/CVE-2016-6313-1.patch: improve the diagram showing the
      random mixing in random/random-csprng.c.
    - debian/patches/CVE-2016-6313-2.patch: hash continuous areas in the
      csprng pool in random/random-csprng.c.
    - CVE-2016-6313

 -- Marc Deslauriers <email address hidden>  Wed, 17 Aug 2016 13:41:27 -0400
Superseded in precise-updates on 2016-08-18
Superseded in precise-security on 2016-08-18
libgcrypt11 (1.5.0-3ubuntu0.5) precise-security; urgency=medium

  * SECURITY UPDATE: side-channel attack on ECDH
    - debian/patches/CVE-2015-7511.patch: perform input validation in
      cipher/ecc.c, src/mpi.h, use constant-time multiplication in
      mpi/ec.c.
    - CVE-2015-7511
  * debian/patches/fix_ec_point_addition.patch: fix addition of EC points
    in mpi/ec.c.

 -- Marc Deslauriers <email address hidden>  Wed, 10 Feb 2016 11:12:46 -0500
Superseded in trusty-updates on 2016-08-18
Superseded in trusty-security on 2016-08-18
libgcrypt11 (1.5.3-2ubuntu4.3) trusty-security; urgency=medium

  * SECURITY UPDATE: side-channel attack on ECDH
    - debian/patches/CVE-2015-7511.patch: perform input validation in
      cipher/ecc.c, src/mpi.h, use constant-time multiplication in
      mpi/ec.c.
    - CVE-2015-7511

 -- Marc Deslauriers <email address hidden>  Wed, 10 Feb 2016 11:03:08 -0500
Deleted in vivid-proposed on 2015-03-29 (Reason: Superseded by libgcrypt20)
libgcrypt11 (1.5.4-2ubuntu2) vivid; urgency=medium

  * SECURITY UPDATE: sidechannel attack on Elgamal
    - debian/patches/CVE-2014-3591.patch: use ciphertext blinding in
      cipher/elgamal.c.
    - CVE-2014-3591
  * SECURITY UPDATE: sidechannel attack via timing variations in mpi_powm
    - debian/patches/CVE-2015-0837.patch: avoid timing variations in
      mpi/mpi-pow.c, mpi/mpiutil.c, src/mpi.h.
    - CVE-2015-0837
 -- Marc Deslauriers <email address hidden>   Thu, 26 Mar 2015 08:16:10 -0400

Available diffs

Obsolete in lucid-updates on 2016-10-26
Obsolete in lucid-security on 2016-10-26
libgcrypt11 (1.4.4-5ubuntu2.4) lucid-security; urgency=medium

  * SECURITY UPDATE: sidechannel attack on Elgamal
    - debian/patches/24-CVE-2014-3591.diff: use ciphertext blinding in
      cipher/elgamal.c.
    - CVE-2014-3591
  * SECURITY UPDATE: sidechannel attack via timing variations in mpi_powm
    - debian/patches/25-CVE-2015-0837.diff: avoid timing variations in
      mpi/mpi-pow.c, mpi/mpiutil.c, src/mpi.h.
    - CVE-2015-0837
 -- Marc Deslauriers <email address hidden>   Thu, 26 Mar 2015 08:55:36 -0400
Superseded in precise-updates on 2016-02-15
Superseded in precise-security on 2016-02-15
libgcrypt11 (1.5.0-3ubuntu0.4) precise-security; urgency=medium

  * SECURITY UPDATE: sidechannel attack on Elgamal
    - debian/patches/CVE-2014-3591.patch: use ciphertext blinding in
      cipher/elgamal.c.
    - CVE-2014-3591
  * SECURITY UPDATE: sidechannel attack via timing variations in mpi_powm
    - debian/patches/CVE-2015-0837.patch: avoid timing variations in
      mpi/mpi-pow.c, mpi/mpiutil.c, src/mpi.h.
    - CVE-2015-0837
 -- Marc Deslauriers <email address hidden>   Thu, 26 Mar 2015 08:51:49 -0400
Obsolete in utopic-updates on 2016-11-03
Obsolete in utopic-security on 2016-11-03
libgcrypt11 (1.5.4-2ubuntu1.1) utopic-security; urgency=medium

  * SECURITY UPDATE: sidechannel attack on Elgamal
    - debian/patches/CVE-2014-3591.patch: use ciphertext blinding in
      cipher/elgamal.c.
    - CVE-2014-3591
  * SECURITY UPDATE: sidechannel attack via timing variations in mpi_powm
    - debian/patches/CVE-2015-0837.patch: avoid timing variations in
      mpi/mpi-pow.c, mpi/mpiutil.c, src/mpi.h.
    - CVE-2015-0837
 -- Marc Deslauriers <email address hidden>   Thu, 26 Mar 2015 08:17:22 -0400
Superseded in trusty-updates on 2016-02-15
Superseded in trusty-security on 2016-02-15
libgcrypt11 (1.5.3-2ubuntu4.2) trusty-security; urgency=medium

  * SECURITY UPDATE: sidechannel attack on Elgamal
    - debian/patches/CVE-2014-3591.patch: use ciphertext blinding in
      cipher/elgamal.c.
    - CVE-2014-3591
  * SECURITY UPDATE: sidechannel attack via timing variations in mpi_powm
    - debian/patches/CVE-2015-0837.patch: avoid timing variations in
      mpi/mpi-pow.c, mpi/mpiutil.c, src/mpi.h.
    - CVE-2015-0837
 -- Marc Deslauriers <email address hidden>   Thu, 26 Mar 2015 08:18:00 -0400
Superseded in lucid-updates on 2015-04-01
Superseded in lucid-security on 2015-04-01
libgcrypt11 (1.4.4-5ubuntu2.3) lucid-security; urgency=medium

  * SECURITY UPDATE: side-channel attack on Elgamal encryption subkeys
    - debian/patches/22-add_gcry_divide_by_zero.diff: replace deliberate
      division by zero with new _gcry_divide_by_zero().
    - debian/patches/23-CVE-2014-5270.diff: use sliding window method for
      exponentiation algorithm in mpi/mpi-pow.c.
    - CVE-2014-5270
 -- Marc Deslauriers <email address hidden>   Tue, 19 Aug 2014 09:12:39 -0400
Superseded in trusty-updates on 2015-04-01
Superseded in trusty-security on 2015-04-01
libgcrypt11 (1.5.3-2ubuntu4.1) trusty-security; urgency=medium

  * SECURITY UPDATE: side-channel attack on Elgamal encryption subkeys
    - debian/patches/add_gcry_divide_by_zero.patch: replace deliberate
      division by zero with new _gcry_divide_by_zero().
    - debian/patches/CVE-2014-5270.patch: use sliding window method for
      exponentiation algorithm in mpi/mpi-pow.c.
    - CVE-2014-5270
 -- Marc Deslauriers <email address hidden>   Tue, 19 Aug 2014 08:59:30 -0400
Superseded in precise-updates on 2015-04-01
Superseded in precise-security on 2015-04-01
libgcrypt11 (1.5.0-3ubuntu0.3) precise-security; urgency=medium

  * SECURITY UPDATE: side-channel attack on Elgamal encryption subkeys
    - debian/patches/add_gcry_divide_by_zero.patch: replace deliberate
      division by zero with new _gcry_divide_by_zero().
    - debian/patches/CVE-2014-5270.patch: use sliding window method for
      exponentiation algorithm in mpi/mpi-pow.c.
    - CVE-2014-5270
 -- Marc Deslauriers <email address hidden>   Tue, 19 Aug 2014 09:09:17 -0400
Deleted in vivid-release on 2016-11-03 (Reason: Superseded by libgcrypt20)
Obsolete in utopic-release on 2016-11-03
Deleted in utopic-proposed on 2016-11-03 (Reason: moved to release)
libgcrypt11 (1.5.4-2ubuntu1) utopic; urgency=medium

  * Merge with Debian; remaining changes:

Available diffs

Superseded in utopic-release on 2014-08-12
Deleted in utopic-proposed on 2014-08-13 (Reason: moved to release)
libgcrypt11 (1.5.3-5ubuntu1) utopic; urgency=medium

  * Merge with Debian; remaining changes:
    - no-global-init-thread-callbacks.diff: Do not call global_init when
      setting thread callbacks.

Available diffs

Superseded in utopic-release on 2014-08-05
Published in trusty-release on 2013-12-19
Deleted in trusty-proposed (Reason: moved to release)
libgcrypt11 (1.5.3-2ubuntu4) trusty; urgency=medium

  * Move texinfo to Build-Depends.
 -- Matthias Klose <email address hidden>   Tue, 17 Dec 2013 13:12:52 +0100
Superseded in trusty-proposed on 2013-12-17
libgcrypt11 (1.5.3-2ubuntu3) trusty; urgency=medium

  * Fix build failure with texinfo 5.1.
 -- Matthias Klose <email address hidden>   Sun, 08 Dec 2013 02:37:55 +0100

Available diffs

Superseded in trusty-proposed on 2013-12-08
libgcrypt11 (1.5.3-2ubuntu2) trusty; urgency=low

  * Build using dh-autoreonf.
 -- Matthias Klose <email address hidden>   Wed, 04 Dec 2013 20:49:51 +0100

Available diffs

Superseded in trusty-release on 2013-12-19
Deleted in trusty-proposed on 2013-12-20 (Reason: moved to release)
libgcrypt11 (1.5.3-2ubuntu1) trusty; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - no-global-init-thread-callbacks.diff: Do not call global_init when
      setting thread callbacks

Available diffs

Superseded in trusty-release on 2013-11-27
Obsolete in saucy-release on 2015-04-24
Deleted in saucy-proposed on 2015-04-28 (Reason: moved to release)
libgcrypt11 (1.5.0-3ubuntu3) saucy; urgency=low

  * SECURITY UPDATE: The path of execution in an exponentiation function may
    depend upon secret key data, allowing a local attacker to determine the
    contents of the secret key through a side-channel attack.
    - debian/patches/CVE-2013-4242.diff: always perform the mpi_mul for
      exponents in secure memory. Based on upstream patch.
    - CVE-2013-4242
 -- Seth Arnold <email address hidden>   Tue, 13 Aug 2013 08:56:30 -0400
Superseded in lucid-updates on 2014-09-03
Superseded in lucid-security on 2014-09-03
libgcrypt11 (1.4.4-5ubuntu2.2) lucid-security; urgency=low

  * SECURITY UPDATE: The path of execution in an exponentiation function may
    depend upon secret key data, allowing a local attacker to determine the
    contents of the secret key through a side-channel attack.
    - debian/patches/21-CVE-2013-4242.diff: always perform the mpi_mul for
      exponents in secure memory. Based on upstream patch.
    - CVE-2013-4242
 -- Seth Arnold <email address hidden>   Tue, 30 Jul 2013 18:05:18 -0700
Superseded in precise-updates on 2014-09-03
Superseded in precise-security on 2014-09-03
libgcrypt11 (1.5.0-3ubuntu0.2) precise-security; urgency=low

  * SECURITY UPDATE: The path of execution in an exponentiation function may
    depend upon secret key data, allowing a local attacker to determine the
    contents of the secret key through a side-channel attack.
    - debian/patches/CVE-2013-4242.diff: always perform the mpi_mul for
      exponents in secure memory. Based on upstream patch.
    - CVE-2013-4242
 -- Seth Arnold <email address hidden>   Tue, 30 Jul 2013 17:31:37 -0700
Obsolete in quantal-updates on 2015-04-24
Obsolete in quantal-security on 2015-04-24
libgcrypt11 (1.5.0-3ubuntu1.1) quantal-security; urgency=low

  * SECURITY UPDATE: The path of execution in an exponentiation function may
    depend upon secret key data, allowing a local attacker to determine the
    contents of the secret key through a side-channel attack.
    - debian/patches/CVE-2013-4242.diff: always perform the mpi_mul for
      exponents in secure memory. Based on upstream patch.
    - CVE-2013-4242
 -- Seth Arnold <email address hidden>   Tue, 30 Jul 2013 17:30:57 -0700
Obsolete in raring-updates on 2015-04-24
Obsolete in raring-security on 2015-04-24
libgcrypt11 (1.5.0-3ubuntu2.2) raring-security; urgency=low

  * SECURITY UPDATE: The path of execution in an exponentiation function may
    depend upon secret key data, allowing a local attacker to determine the
    contents of the secret key through a side-channel attack.
    - debian/patches/CVE-2013-4242.diff: always perform the mpi_mul for
      exponents in secure memory. Based on upstream patch.
    - CVE-2013-4242
 -- Seth Arnold <email address hidden>   Tue, 30 Jul 2013 17:29:54 -0700
Superseded in saucy-release on 2013-08-13
Obsolete in raring-release on 2015-04-24
Deleted in raring-proposed on 2015-04-27 (Reason: moved to release)
libgcrypt11 (1.5.0-3ubuntu2.1) raring; urgency=low

  * Reverts previous upload since it broke graphical login with gnupg-agent
    installed (LP: #1076906)
 -- Adam Stokes <email address hidden>   Fri, 09 Nov 2012 11:09:25 -0500

Available diffs

Superseded in raring-release on 2012-11-09
Deleted in raring-proposed on 2012-11-20 (Reason: moved to release)
libgcrypt11 (1.5.0-3ubuntu2) raring-proposed; urgency=low

  [Howard Chu]
  * debian/patches/enable-global-init-secure-memory.patch:
    Fix regression during disable/suspend of secure memory
    (LP: #1013798)
 -- Adam Stokes <email address hidden>   Mon, 05 Nov 2012 11:05:59 -0500

Available diffs

Superseded in lucid-updates on 2013-08-01
Deleted in lucid-proposed on 2013-08-02 (Reason: moved to -updates)
libgcrypt11 (1.4.4-5ubuntu2.1) lucid-proposed; urgency=low

  * Do not call global_init when setting thread callbacks (LP: #423252)
 -- Adam Stokes <email address hidden>   Thu, 24 May 2012 16:31:52 -0400

Available diffs

Obsolete in natty-proposed on 2013-06-04
libgcrypt11 (1.4.6-4ubuntu2.1) natty-proposed; urgency=low

  * Do not call global_init when setting thread callbacks (LP: #423252)
 -- Adam Stokes <email address hidden>   Thu, 17 May 2012 11:05:48 -0400

Available diffs

Obsolete in oneiric-proposed on 2015-04-24
libgcrypt11 (1.5.0-1ubuntu0.1) oneiric-proposed; urgency=low

  * Do not call global_init when setting thread callbacks (LP: #423252)
 -- Adam Stokes <email address hidden>   Thu, 17 May 2012 10:53:42 -0400

Available diffs

Superseded in precise-updates on 2013-08-01
Deleted in precise-proposed on 2013-08-02 (Reason: moved to -updates)
libgcrypt11 (1.5.0-3ubuntu0.1) precise-proposed; urgency=low

  * Do not call global_init when setting thread callbacks (LP: #423252)
 -- Adam Stokes <email address hidden>   Wed, 16 May 2012 13:35:06 -0400

Available diffs

Superseded in raring-release on 2012-11-07
Obsolete in quantal-release on 2015-04-24
libgcrypt11 (1.5.0-3ubuntu1) quantal; urgency=low

  * Do not call global_init when setting thread callbacks (LP: #423252)
 -- Adam Stokes <email address hidden>   Tue, 15 May 2012 13:56:17 -0400

Available diffs

Superseded in quantal-release on 2012-05-16
Published in precise-release on 2011-10-17
libgcrypt11 (1.5.0-3) unstable; urgency=low

  * Upload to unstable.
  * Drop 20_workaroundarmgcc.diff (1.4.6/unstable). It seems to be unnecessary
    with 1.5.0.
  * libgcrypt11 Breaks gnupg2|gpgsm (<< 2.0.17-2ubuntu2) and libgnutls26 (<<
    2.12.7-3). See https://bugs.launchpad.net/bugs/815190 and
    https://lists.gnu.org/archive/html/gnutls-devel/2011-07/msg00001.html

Available diffs

Superseded in precise-release on 2011-10-17
Obsolete in oneiric-release on 2015-04-24
libgcrypt11 (1.5.0-1) experimental; urgency=low

  * Merge multi-arch changes (1.4.6-6 and 1.4.6-7), drop libtool la file.
  * Drop CFLAGS += -Wall again, it has become unnecessary.
  * New upstream version.
  * Bump shlibs

Available diffs

Superseded in oneiric-release on 2011-07-11
libgcrypt11 (1.4.6-5ubuntu1) oneiric; urgency=low

  * Merge from Debian unstable, remaining changes:
    - build for multiarch.

Available diffs

Superseded in oneiric-release on 2011-05-21
Obsolete in natty-release on 2013-06-04
libgcrypt11 (1.4.6-4ubuntu2) natty; urgency=low

  * Move libgcrypt.so into /usr/lib/$(DEB_HOST_MULTIARCH) where it belongs.
 -- Steve Langasek <email address hidden>   Tue, 22 Mar 2011 12:45:05 -0700

Available diffs

Superseded in natty-release on 2011-03-22
libgcrypt11 (1.4.6-4ubuntu1) natty; urgency=low

  * FFe LP: #733501: build for multiarch.
 -- Steve Langasek <email address hidden>   Mon, 21 Mar 2011 21:48:40 -0700

Available diffs

Superseded in natty-release on 2011-03-22
libgcrypt11 (1.4.6-4) experimental; urgency=low

  * Stricter version requirement (>> 1.10-0.1 instead of >= 1.4) on the
    libgpg-error-dev build-dependency, to get correct dependencies in the
    udeb.
  * Use debhelper compatibility level 7.

Available diffs

Superseded in natty-release on 2011-02-01
libgcrypt11 (1.4.5-2ubuntu2) natty; urgency=low

  * Fix build failure with DSO link changes.
 -- Matthias Klose <email address hidden>   Thu, 07 Oct 2010 17:03:33 +0200

Available diffs

Superseded in natty-release on 2010-10-15
Obsolete in maverick-release on 2013-03-05
libgcrypt11 (1.4.5-2ubuntu1) maverick; urgency=low

  * Merge from Debian unstable (LP: #607861). Remaining changes:
    - Add libgcrypt11-udeb for use by cryptsetup-udeb.
    - Install to /lib.
    - Disable tests when cross-building.
    - Adjust install/libgcrypt11-dev target to cope with move to /lib.

Available diffs

Superseded in maverick-release on 2010-08-07
Obsolete in lucid-release on 2016-10-26
libgcrypt11 (1.4.4-5ubuntu2) lucid; urgency=low

  * Adjust install/libgcrypt11-dev target to cope with move to /lib.
 -- Colin Watson <email address hidden>   Tue, 10 Nov 2009 18:16:18 +0000

Available diffs

Superseded in lucid-release on 2009-11-10
libgcrypt11 (1.4.4-5ubuntu1) lucid; urgency=low

  * Resynchronise with Debian. Remaining changes:
    - Add libgcrypt11-udeb for use by cryptsetup-udeb.
    - Install to /lib.
    - Disable tests when cross-building.
  * Drop clean-la.mk as debian/rules now does that itself.

Available diffs

Superseded in lucid-release on 2009-11-10
Obsolete in karmic-release on 2013-03-04
libgcrypt11 (1.4.4-2ubuntu2) karmic; urgency=low

  * Fix stack smashing on VIA processors with Padlock RNG (patch by Tomas
    Mraz of Red Hat; thanks to Roberto Rosario for the archaeology; LP:
    #389053).

 -- Colin Watson <email address hidden>   Thu, 02 Jul 2009 11:34:18 +0100

Available diffs

Superseded in karmic-release on 2009-07-02
libgcrypt11 (1.4.4-2ubuntu1) karmic; urgency=low

  * Merge from Debian unstable (LP: #364535), remaining changes:
    - Add libgcrypt11-udeb for use by cryptsetup-udeb.
    - Add clean-la.mk, and add a symlink for the .la
    - Install to /lib.

Available diffs

Superseded in karmic-release on 2009-06-06
Obsolete in jaunty-release on 2013-02-28
libgcrypt11 (1.4.1-2ubuntu1) jaunty; urgency=low

  * Merge from debian unstable, remaining changes:
    - Add libgcrypt11-udeb for use by cryptsetup-udeb.
    - Add clean-la.mk, and add a symlink for the .la
    - Install to /lib.  LP: #139635

Available diffs

Superseded in jaunty-release on 2008-11-11
Obsolete in intrepid-release on 2013-02-20
libgcrypt11 (1.4.1-1ubuntu1) intrepid; urgency=low

  * Merge from Debian unstable.
  * Remaining Ubuntu changes:
    - Add libgcrypt11-udeb package.
    - Add clean-la.mk, and add a symlink for the .la
  * Ubuntu changes dropped:
    - Build-Depends changes.
    - Drop patch 20_socket_nsl_linkage.diff, basically applied upstream.

 -- Steve Kowalik <email address hidden>   Wed, 02 Jul 2008 18:32:45 +1000

Available diffs

Superseded in intrepid-release on 2008-07-02
Obsolete in hardy-release on 2015-04-24
libgcrypt11 (1.2.4-2ubuntu7) hardy; urgency=low

  * Damn. The .la file doesn't contain 11, correct the symlink.

 -- Steve Kowalik <email address hidden>   Fri, 07 Dec 2007 21:43:14 +1100
Superseded in hardy-release on 2007-12-07
libgcrypt11 (1.2.4-2ubuntu6) hardy; urgency=low

  * Add a symlink from /usr/lib/libgcrypt11.la into /lib.

 -- Steve Kowalik <email address hidden>   Fri, 07 Dec 2007 21:27:58 +1100
Superseded in hardy-release on 2007-12-07
libgcrypt11 (1.2.4-2ubuntu5) hardy; urgency=low

  * Include cdbs' new and shiny clean-la.mk, and bump Build-Depends.

 -- Steve Kowalik <email address hidden>   Wed, 07 Nov 2007 09:02:49 +1100
Superseded in hardy-release on 2007-11-06
libgcrypt11 (1.2.4-2ubuntu4) hardy; urgency=low

  * Rebuild with --libdir=/lib, and fix up the *.install files.
  * Force the .la to be installed in /usr/lib.

 -- Steve Kowalik <email address hidden>   Mon, 05 Nov 2007 10:14:04 +1100
Superseded in hardy-release on 2007-11-05
libgcrypt11 (1.2.4-2ubuntu3) hardy; urgency=low

  * move library from /usr/lib to /lib (LP: #139635)

 -- Reinhard Tartler <email address hidden>   Tue, 30 Oct 2007 11:15:02 -0400
Superseded in hardy-release on 2007-10-30
Obsolete in gutsy-release on 2011-09-16
libgcrypt11 (1.2.4-2ubuntu2) gutsy; urgency=low

  * Modernise autoconf detection of socket() and gethostbyname() to
    eliminate libnsl linkage on Linux.

 -- Colin Watson <email address hidden>   Wed, 19 Sep 2007 13:34:42 +0100
Superseded in gutsy-release on 2007-09-19
libgcrypt11 (1.2.4-2ubuntu1) gutsy; urgency=low

  * Add libgcrypt11-udeb for use by cryptsetup-udeb.
  * Bump debhelper build-dependency to 5.0.22 for dh_makeshlibs --add-udeb.

 -- Colin Watson <email address hidden>   Wed, 19 Sep 2007 01:23:59 +0100
Superseded in gutsy-release on 2007-09-19
libgcrypt11 (1.2.4-2) unstable; urgency=low

  * Upload to unstable.
  * Drop -lgpg-error from libgcrypt-config --libs output. (Closes: #405238)
  * Switch to debhelper v5 mode.
  * New upstream version closes filehandles in gcry_rndlinux_gather_random().
    (Closes: #403613)

Superseded in gutsy-release on 2007-04-27
Obsolete in feisty-release on 2009-08-20
libgcrypt11 (1.2.3-2build1) feisty; urgency=low

  * Rebuild for changes in the amd64 toolchain.

 -- Matthias Klose <email address hidden>   Mon,  5 Mar 2007 01:20:23 +0000
Superseded in feisty-release on 2007-03-05
libgcrypt11 (1.2.3-2) unstable; urgency=low

  [ Andreas Metzler ]
  * Actually the keygen test does not access /dev/random, the pubkey test is
    the entropy expensive one. Disable running pubkey test on arm, s390 and
    sparc where it caused FTBFS. Re-enable keygen on s390. (closes: #385805)

Superseded in feisty-release on 2006-11-08
Obsolete in edgy-release on 2008-06-19
libgcrypt11 (1.2.2-2) unstable; urgency=low

  [ James Westby ]
  * New maintainer team. Thanks, Matthias for all the work you did.
  * Set maintainer to alioth mailinglist.
  * Drop build-dependency on binutils (>= 2.14.90.0.7), even sarge has 2.15-6.
  * Standards-Version: 3.7.2, no changes required.
  * Clean packaging against upstream tarball.
  * Drop debian/*.dirs as dh_* will create the necessary directories.
  * Remove code from debian/rules to update config.sub and config.guess as it
    is handled by cdbs. Build-Depends on autotools-dev.
  * Pass --enable-noexecstack to ./configure (closes: #321720)
  * Use cdbs' simple-patchsys.mk.
    - add debian/README.source_and_patches
    - add debian/patches/11_gcrypt_h_362636 (closes: #362636)
    - add debian/patches/20_doc_gcrypt_texi_typos.patch to correct a small
      typo in doc/gcrypt.texi (not a new patch)
  * Tidied up the debian/copyright file. Noted that the documentation is now
    licensed under the GPL (closes: #323458)
  * Remove Build-Depends-Indep as it contained no packages that are not in
    Build-Depends.
  * Remove the change to doc/gcrpyt.texi that rendered incorrectly.
  * Use symbol versioning by passing --enable-ld-version-script in
    DEB_CONFIGURE_EXTRA_FLAGS in debian/rules.

  [ Andreas Metzler ]
  * Add patches/13_powerpc64_284609.diff (not a new patch).
  * Set DEB_MAKE_CHECK_TARGET = check to run included testsuite.

 -- Ubuntu Archive Auto-Sync <email address hidden>   Mon,  10 Jul 2006 12:34:48 +0100
Superseded in edgy-release on 2006-07-10
Obsolete in dapper-release on 2011-09-06
Superseded in dapper-release on 2006-02-03
libgcrypt11 (1.2.2-1) unstable; urgency=low


  * Updated to new Upstream version.
  * Update shlibdep version to 1.2.2
  * Update copyright file with pointers to the current SCM archives.

 -- Matthias Urlichs <email address hidden>  Tue, 18 Oct 2005 18:27:03 +0200
Obsolete in breezy-release on 2008-03-25
libgcrypt11 (1.2.1-3) unstable; urgency=low


  * Rewrote Description: in debian/control.
    Closes: #291984: DSA is not a hash function
  * Added Priority: important to the runtime library, because it is.
  * Added a missing period to doc/gcrypt.texi.
    Closes: #317474: install-info errors during installation
  * Updated Standards-Version: to 3.6.2; no changes.

 -- Matthias Urlichs <email address hidden>  Thu, 14 Jul 2005 05:55:01 +0200
Obsolete in hoary-release on 2008-03-19
libgcrypt11 (1.2.0-11) unstable; urgency=low


  * Support ppc64.
    Patch by Rafael Ávila de Espíndola <email address hidden>
    Closes:#284609

 -- Matthias Urlichs <email address hidden>  Wed,  8 Dec 2004 16:59:34 +0100
Obsolete in warty-release on 2008-01-09
libgcrypt11 (1.2.0-1ubuntu1) warty; urgency=low


  * made libgcrypt11-doc conflict to libgcrypt-doc (Warty bug #2041)

 -- Martin Pitt <email address hidden>  Mon,  4 Oct 2004 14:12:16 +0200
161 of 61 results