Change logs for libgcrypt11 source package in Trusty

  • libgcrypt11 (1.5.3-2ubuntu4.6) trusty-security; urgency=medium
    
      * SECURITY UPDATE: memory-cache side-channel attack on ECDSA signatures
        - debian/patches/CVE-2018-0495.patch: add blinding for ECDSA in
          cipher/ecc.
        - CVE-2018-0495
    
     -- Marc Deslauriers <email address hidden>  Mon, 18 Jun 2018 09:40:59 -0400
  • libgcrypt11 (1.5.3-2ubuntu4.5) trusty-security; urgency=medium
    
      * SECURITY UPDATE: full RSA key recovery via side-channel attack
        - debian/patches/CVE-2017-7526-1.patch: simplify loop in mpi/mpi-pow.c.
        - debian/patches/CVE-2017-7526-2.patch: use same computation for square
          and multiply in mpi/mpi-pow.c.
        - debian/patches/CVE-2017-7526-3.patch: add exponent blinding in
          cipher/rsa.c.
        - debian/patches/CVE-2017-7526-4.patch: add free to cipher/rsa.c.
        - debian/patches/CVE-2017-7526-5.patch: add free to cipher/rsa.c.
        - CVE-2017-7526
    
     -- Marc Deslauriers <email address hidden>  Mon, 03 Jul 2017 08:21:32 -0400
  • libgcrypt11 (1.5.3-2ubuntu4.4) trusty-security; urgency=medium
    
      * SECURITY UPDATE: random number generator prediction
        - debian/patches/CVE-2016-6313-1.patch: improve the diagram showing the
          random mixing in random/random-csprng.c.
        - debian/patches/CVE-2016-6313-2.patch: hash continuous areas in the
          csprng pool in random/random-csprng.c.
        - CVE-2016-6313
    
     -- Marc Deslauriers <email address hidden>  Wed, 17 Aug 2016 13:39:25 -0400
  • libgcrypt11 (1.5.3-2ubuntu4.3) trusty-security; urgency=medium
    
      * SECURITY UPDATE: side-channel attack on ECDH
        - debian/patches/CVE-2015-7511.patch: perform input validation in
          cipher/ecc.c, src/mpi.h, use constant-time multiplication in
          mpi/ec.c.
        - CVE-2015-7511
    
     -- Marc Deslauriers <email address hidden>  Wed, 10 Feb 2016 11:03:08 -0500
  • libgcrypt11 (1.5.3-2ubuntu4.2) trusty-security; urgency=medium
    
      * SECURITY UPDATE: sidechannel attack on Elgamal
        - debian/patches/CVE-2014-3591.patch: use ciphertext blinding in
          cipher/elgamal.c.
        - CVE-2014-3591
      * SECURITY UPDATE: sidechannel attack via timing variations in mpi_powm
        - debian/patches/CVE-2015-0837.patch: avoid timing variations in
          mpi/mpi-pow.c, mpi/mpiutil.c, src/mpi.h.
        - CVE-2015-0837
     -- Marc Deslauriers <email address hidden>   Thu, 26 Mar 2015 08:18:00 -0400
  • libgcrypt11 (1.5.3-2ubuntu4.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: side-channel attack on Elgamal encryption subkeys
        - debian/patches/add_gcry_divide_by_zero.patch: replace deliberate
          division by zero with new _gcry_divide_by_zero().
        - debian/patches/CVE-2014-5270.patch: use sliding window method for
          exponentiation algorithm in mpi/mpi-pow.c.
        - CVE-2014-5270
     -- Marc Deslauriers <email address hidden>   Tue, 19 Aug 2014 08:59:30 -0400
  • libgcrypt11 (1.5.3-2ubuntu4) trusty; urgency=medium
    
      * Move texinfo to Build-Depends.
     -- Matthias Klose <email address hidden>   Tue, 17 Dec 2013 13:12:52 +0100
  • libgcrypt11 (1.5.3-2ubuntu3) trusty; urgency=medium
    
      * Fix build failure with texinfo 5.1.
     -- Matthias Klose <email address hidden>   Sun, 08 Dec 2013 02:37:55 +0100
  • libgcrypt11 (1.5.3-2ubuntu2) trusty; urgency=low
    
      * Build using dh-autoreonf.
     -- Matthias Klose <email address hidden>   Wed, 04 Dec 2013 20:49:51 +0100
  • libgcrypt11 (1.5.3-2ubuntu1) trusty; urgency=low
    
      * Merge from Debian unstable.  Remaining changes:
        - no-global-init-thread-callbacks.diff: Do not call global_init when
          setting thread callbacks
    
    libgcrypt11 (1.5.3-2) unstable; urgency=low
    
      * Convert to dh and move building of ps and html docs to
        override_dh_auto_build-indep. Enable parallel building.
    
    libgcrypt11 (1.5.3-1) unstable; urgency=high
    
      * New upstream bugfix release. (CVE-2013-4242)
    
    libgcrypt11 (1.5.2-3) unstable; urgency=low
    
      * Install libgcrypt.a and libgcrypt.so to /usr.
      * [15_multiarchpath_in_-L.diff] Do not print -L/lib/i386-linux-gnu on
        "libgcrypt-config --libs".
      * Use debhelper v9 mode. This allows us to mark libgcrypt11-dbg Multi-Arch:
        same.
    
    libgcrypt11 (1.5.2-2) unstable; urgency=low
    
      * Upload to unstable.
      * Fix vcs-field-not-canonical lintian error by refering to anonscm instead
        of svn.debian.org.
      * Update info in debian/copyright from upstream's README, fixing typo 'teh'.
      * Delete some outdated and unused code in debian/rules.
    
    libgcrypt11 (1.5.2-1) experimental; urgency=low
    
      * New upstream version.
        + IDEA support added.
      * Move list of supported algorithms to a separate paragraph in description
        to decrease work-load of translators. Closes: #640261
      * Move TeX-packages from b-d to Build-Depends-Indep. (Thanks, P. J.
        McDermott) Closes: #682597
    
    libgcrypt11 (1.5.1-1) experimental; urgency=low
    
      * Point watchfile to stable release.
      * New upstream version.
      * Drop superfluous patches:
        29_Fix-a-problem-with-select-and-high-fds.patch
        30_Avoid-dereferencing-pointer-right-after-the-end.patch
        31_Fix-segv-with-AES-NI-on-some-platforms.patch
        32_libgcrypt-1.5-rinjdael-Fix-use-of-SSE2-outside-USE_A.patch
      * Bump version gcry_control@GCRYPT_1.2 in debian/libgcrypt11.symbols from
        1.4.5 to 1.5.1 since its argument enum has a new member.
    
    libgcrypt11 (1.5.0-5) unstable; urgency=low
    
      * While we are at it also pick
        29_Fix-a-problem-with-select-and-high-fds.patch
        LP: #1084279
    
    libgcrypt11 (1.5.0-4) unstable; urgency=low
    
      * Pull patches from upstream LIBGCRYPT-1-5-BRANCH:
          30_Avoid-dereferencing-pointer-right-after-the-end.patch
          31_Fix-segv-with-AES-NI-on-some-platforms.patch
             <https://bugs.g10code.com/gnupg/issue1452> LP: #1105758
          32_libgcrypt-1.5-rinjdael-Fix-use-of-SSE2-outside-USE_A.patch
        Closes: #699034
     -- Seth Arnold <email address hidden>   Wed, 27 Nov 2013 10:36:27 -0800
  • libgcrypt11 (1.5.0-3ubuntu3) saucy; urgency=low
    
      * SECURITY UPDATE: The path of execution in an exponentiation function may
        depend upon secret key data, allowing a local attacker to determine the
        contents of the secret key through a side-channel attack.
        - debian/patches/CVE-2013-4242.diff: always perform the mpi_mul for
          exponents in secure memory. Based on upstream patch.
        - CVE-2013-4242
     -- Seth Arnold <email address hidden>   Tue, 13 Aug 2013 08:56:30 -0400