Change logs for gnupg source package in Precise

  • gnupg (1.4.11-3ubuntu2.12) precise-security; urgency=medium
    
      * SECURITY UPDATE: full RSA key recovery via side-channel attack
        - debian/patches/CVE-2017-7526-part1.dpatch: simplify loop in mpi/mpi-pow.c.
        - debian/patches/CVE-2017-7526-part2.dpatch: use same computation for square
          and multiply in mpi/mpi-pow.c.
        - debian/patches/CVE-2017-7526-part3.dpatch: fix allocation size for mpi_pow
        - debian/patches/CVE-2017-7526-part4.dpatch: add exponent blinding in
          cipher/rsa.c.
        - debian/patches/CVE-2017-7526-part5.dpatch: allow different build directory
        - debian/patches/CVE-2017-7526-part6.dpatch: Reduce secmem pressure in
          cipher/rsa.c.
        - CVE-2017-7526
    
     -- <email address hidden> (Leonidas S. Barbosa)  Wed, 15 Aug 2018 11:30:05 -0300
  • gnupg (1.4.11-3ubuntu2.10) precise-security; urgency=medium
    
      * SECURITY UPDATE: random number generator prediction
        - debian/patches/CVE-2016-6313.dpatch: improve readability by using a
          macro and hash continuous areas in the csprng pool in
          cipher/random.c.
        - CVE-2016-6313
    
     -- Marc Deslauriers <email address hidden>  Wed, 17 Aug 2016 13:37:00 -0400
  • gnupg (1.4.11-3ubuntu2.9) precise-security; urgency=medium
    
      * Screen responses from keyservers (LP: #1409117)
        - d/p/0001-Screen-keyserver-responses.dpatch
        - d/p/0002-Make-screening-of-keyserver-result-work-with-multi-k.dpatch
        - d/p/0003-Add-kbnode_t-for-easier-backporting.dpatch
        - d/p/0004-gpg-Fix-regression-due-to-the-keyserver-import-filte.dpatch
      * Fix large key size regression from CVE-2014-5270 changes (LP: #1371766)
        - d/p/Add-build-and-runtime-support-for-larger-RSA-key.dpatch
        - debian/rules: build with --enable-large-secmem
      * SECURITY UPDATE: sidechannel attack on Elgamal
        - debian/patches/CVE-2014-3591.dpatch: use ciphertext blinding in
          cipher/elgamal.c.
        - CVE-2014-3591
      * SECURITY UPDATE: sidechannel attack via timing variations in mpi_powm
        - debian/patches/CVE-2015-0837.dpatch: avoid timing variations in
          include/mpi.h, mpi/mpi-pow.c, mpi/mpiutil.c.
        - CVE-2015-0837
      * SECURITY UPDATE: invalid memory read via invalid keyring
        - debian/patches/CVE-2015-1606.dpatch: skip all packets not allowed in
          a keyring in g10/keyring.c.
        - CVE-2015-1606
      * SECURITY UPDATE: memcpy with overlapping ranges
        - debian/patches/CVE-2015-1607.dpatch: use inline functions to convert
          buffer data to scalars in g10/apdu.c, g10/app-openpgp.c,
          g10/build-packet.c, g10/ccid-driver.c, g10/getkey.c, g10/keygen.c,
          g10/keyid.c, g10/misc.c, g10/parse-packet.c, g10/tdbio.c,
          g10/trustdb.c, include/host2net.h.
        - CVE-2015-1607
     -- Marc Deslauriers <email address hidden>   Fri, 27 Mar 2015 08:24:00 -0400
  • gnupg (1.4.11-3ubuntu2.7) precise-security; urgency=medium
    
      * SECURITY UPDATE: side-channel attack on Elgamal encryption subkeys
        - debian/patches/CVE-2014-5270.dpatch: use sliding window method for
          exponentiation algorithm in mpi/mpi-pow.c.
        - CVE-2014-5270
     -- Marc Deslauriers <email address hidden>   Tue, 19 Aug 2014 09:41:45 -0400
  • gnupg (1.4.11-3ubuntu2.6) precise-security; urgency=medium
    
      * SECURITY UPDATE: denial of service via uncompressing garbled packets
        - debian/patches/CVE-2014-4617.dpatch: limit number of extra bytes in
          g10/compress.c.
        - CVE-2014-4617
     -- Marc Deslauriers <email address hidden>   Thu, 26 Jun 2014 08:30:14 -0400
  • gnupg (1.4.11-3ubuntu2.5) precise-security; urgency=low
    
      * SECURITY UPDATE: RSA Key Extraction via Low-Bandwidth Acoustic
        Cryptanalysis attack
        - debian/patches/CVE-2013-4576.dpatch: Use blinding for the RSA secret
          operation in cipher/random.*, cipher/rsa.c, g10/gpgv.c. Normalize the
          MPIs used as input to secret key functions in cipher/dsa.c,
          cipher/elgamal.c, cipher/rsa.c.
        - CVE-2013-4576
     -- Marc Deslauriers <email address hidden>   Wed, 18 Dec 2013 11:17:02 -0500
  • gnupg (1.4.11-3ubuntu2.4) precise-security; urgency=low
    
      * SECURITY UPDATE: incorrect no-usage-permitted flag handling
        - debian/patches/CVE-2013-4351.dpatch: correctly handle empty key flags
          in g10/getkey.c, g10/keygen.c, include/cipher.h.
        - CVE-2013-4351
      * SECURITY UPDATE: denial of service via infinite recursion
        - debian/patches/CVE-2013-4402.dpatch: set limits on number of filters
          and nested packets in util/iobuf.c, g10/mainproc.c.
        - CVE-2013-4402
     -- Marc Deslauriers <email address hidden>   Tue, 08 Oct 2013 07:49:58 -0400
  • gnupg (1.4.11-3ubuntu2.3) precise-security; urgency=low
    
      * SECURITY UPDATE: The path of execution in an exponentiation function may
        depend upon secret key data, allowing a local attacker to determine the
        contents of the secret key through a side-channel attack.
        - debian/patches/CVE-2013-4242.dpatch: always perform the mpi_mul for
          exponents in secure memory. Based on upstream patch.
        - CVE-2013-4242
     -- Seth Arnold <email address hidden>   Tue, 30 Jul 2013 15:51:17 -0700
  • gnupg (1.4.11-3ubuntu2.2) precise-security; urgency=low
    
      * SECURITY UPDATE: keyring corruption via malformed key import
        - debian/patches/CVE-2012-6085.dpatch: validate PKTTYPE in g10/import.c.
        - CVE-2012-6085
     -- Marc Deslauriers <email address hidden>   Tue, 08 Jan 2013 10:52:55 -0500
  • gnupg (1.4.11-3ubuntu2.1) precise-security; urgency=low
    
      * debian/patches/long-keyids.dpatch: Use the longest key ID available
        when requesting a key from a key server.
     -- Marc Deslauriers <email address hidden>   Tue, 14 Aug 2012 08:34:24 -0400
  • gnupg (1.4.11-3ubuntu2) precise; urgency=low
    
      * Mark gnupg, gnupg-curl, and gpgv Multi-Arch: foreign.
     -- Colin Watson <email address hidden>   Mon, 21 Nov 2011 13:42:07 +0000
  • gnupg (1.4.11-3ubuntu1) natty; urgency=low
    
      * Resynchronise with Debian (LP: #720905).  Remaining changes:
        - Disable mlock() test since it fails with ulimit 0 (on buildds).
        - Set gpg (or gpg2) and gpgsm to use a passphrase agent by default.
        - Fix udeb build failure on powerpc, building with -O2 instead of -Os.
        - Only suggest gnupg-curl and libldap; recommendations are pulled into
          minimal, and we don't need the keyserver utilities in a minimal Ubuntu
          system.
      * debian/{control,rules}: Remove the Win32 build (and mingw32
        build-dependency), since mingw32 is in universe, and will remain so for
        the forseeable future.
    
    gnupg (1.4.11-3) unstable; urgency=low
    
      * Install gpg setuid root again on kFreeBSD. We dropped this
        bit earlier because it's not necessary anymore on Linux, but
        the kFreeBSD kernel still requires it for secure memory.
        Thanks Robert Millan for the patch. (Closes: 598471)
      * Add a gpgv-win32 package, to be used by win32-loader. Patch
        from Didier Raboud (Closes: #612462).
    
    gnupg (1.4.11-2) experimental; urgency=low
    
      * Update standards-version to 3.9.1, no changes needed.
      * Apply patch based on Werner Koch's work that (again)
        resolves a build failure on mips(el); issue addressed
        in 1.4.10-4 was only partly solved upstream.
      * Add README.Debian with smart card reader info, thanks
        Jonathan Nieder (Closes: #575763).
    
    gnupg (1.4.11-1) experimental; urgency=low
    
      * New upstream release (Closes: #600587).
        + Obsoletes all previously existing Debian patches:
          567580_menu_prompt_reflects_program.dpatch
          560692_fix_fatal_after_homedir_creation.dpatch
          489225_catch_expired_primary_key_with_valid_subkey.dpatch
          fix_infinite_loop_r5264.dpatch
          567593_improve_info_and_faq.dpatch
          551709_fix_info_link_entry.dpatch
          560995_fix_ftbfs_on_sparc64.dpatch
          mips_gcc4.4.dpatch
          553175_document_primary_uid_sign.dpatch
        + No longer ships outdated faq.html.
    
      * Update references to RFC 2440 into RFC 4880. Thanks
        Christoph Anton Mitterer (Closes: #592294).
     -- Rico Tzschichholz <email address hidden>   Tue, 22 Feb 2011 11:00:25 +0100