-
gnupg (1.4.11-3ubuntu2.12) precise-security; urgency=medium
* SECURITY UPDATE: full RSA key recovery via side-channel attack
- debian/patches/CVE-2017-7526-part1.dpatch: simplify loop in mpi/mpi-pow.c.
- debian/patches/CVE-2017-7526-part2.dpatch: use same computation for square
and multiply in mpi/mpi-pow.c.
- debian/patches/CVE-2017-7526-part3.dpatch: fix allocation size for mpi_pow
- debian/patches/CVE-2017-7526-part4.dpatch: add exponent blinding in
cipher/rsa.c.
- debian/patches/CVE-2017-7526-part5.dpatch: allow different build directory
- debian/patches/CVE-2017-7526-part6.dpatch: Reduce secmem pressure in
cipher/rsa.c.
- CVE-2017-7526
-- <email address hidden> (Leonidas S. Barbosa) Wed, 15 Aug 2018 11:30:05 -0300
-
gnupg (1.4.11-3ubuntu2.10) precise-security; urgency=medium
* SECURITY UPDATE: random number generator prediction
- debian/patches/CVE-2016-6313.dpatch: improve readability by using a
macro and hash continuous areas in the csprng pool in
cipher/random.c.
- CVE-2016-6313
-- Marc Deslauriers <email address hidden> Wed, 17 Aug 2016 13:37:00 -0400
-
gnupg (1.4.11-3ubuntu2.9) precise-security; urgency=medium
* Screen responses from keyservers (LP: #1409117)
- d/p/0001-Screen-keyserver-responses.dpatch
- d/p/0002-Make-screening-of-keyserver-result-work-with-multi-k.dpatch
- d/p/0003-Add-kbnode_t-for-easier-backporting.dpatch
- d/p/0004-gpg-Fix-regression-due-to-the-keyserver-import-filte.dpatch
* Fix large key size regression from CVE-2014-5270 changes (LP: #1371766)
- d/p/Add-build-and-runtime-support-for-larger-RSA-key.dpatch
- debian/rules: build with --enable-large-secmem
* SECURITY UPDATE: sidechannel attack on Elgamal
- debian/patches/CVE-2014-3591.dpatch: use ciphertext blinding in
cipher/elgamal.c.
- CVE-2014-3591
* SECURITY UPDATE: sidechannel attack via timing variations in mpi_powm
- debian/patches/CVE-2015-0837.dpatch: avoid timing variations in
include/mpi.h, mpi/mpi-pow.c, mpi/mpiutil.c.
- CVE-2015-0837
* SECURITY UPDATE: invalid memory read via invalid keyring
- debian/patches/CVE-2015-1606.dpatch: skip all packets not allowed in
a keyring in g10/keyring.c.
- CVE-2015-1606
* SECURITY UPDATE: memcpy with overlapping ranges
- debian/patches/CVE-2015-1607.dpatch: use inline functions to convert
buffer data to scalars in g10/apdu.c, g10/app-openpgp.c,
g10/build-packet.c, g10/ccid-driver.c, g10/getkey.c, g10/keygen.c,
g10/keyid.c, g10/misc.c, g10/parse-packet.c, g10/tdbio.c,
g10/trustdb.c, include/host2net.h.
- CVE-2015-1607
-- Marc Deslauriers <email address hidden> Fri, 27 Mar 2015 08:24:00 -0400
-
gnupg (1.4.11-3ubuntu2.7) precise-security; urgency=medium
* SECURITY UPDATE: side-channel attack on Elgamal encryption subkeys
- debian/patches/CVE-2014-5270.dpatch: use sliding window method for
exponentiation algorithm in mpi/mpi-pow.c.
- CVE-2014-5270
-- Marc Deslauriers <email address hidden> Tue, 19 Aug 2014 09:41:45 -0400
-
gnupg (1.4.11-3ubuntu2.6) precise-security; urgency=medium
* SECURITY UPDATE: denial of service via uncompressing garbled packets
- debian/patches/CVE-2014-4617.dpatch: limit number of extra bytes in
g10/compress.c.
- CVE-2014-4617
-- Marc Deslauriers <email address hidden> Thu, 26 Jun 2014 08:30:14 -0400
-
gnupg (1.4.11-3ubuntu2.5) precise-security; urgency=low
* SECURITY UPDATE: RSA Key Extraction via Low-Bandwidth Acoustic
Cryptanalysis attack
- debian/patches/CVE-2013-4576.dpatch: Use blinding for the RSA secret
operation in cipher/random.*, cipher/rsa.c, g10/gpgv.c. Normalize the
MPIs used as input to secret key functions in cipher/dsa.c,
cipher/elgamal.c, cipher/rsa.c.
- CVE-2013-4576
-- Marc Deslauriers <email address hidden> Wed, 18 Dec 2013 11:17:02 -0500
-
gnupg (1.4.11-3ubuntu2.4) precise-security; urgency=low
* SECURITY UPDATE: incorrect no-usage-permitted flag handling
- debian/patches/CVE-2013-4351.dpatch: correctly handle empty key flags
in g10/getkey.c, g10/keygen.c, include/cipher.h.
- CVE-2013-4351
* SECURITY UPDATE: denial of service via infinite recursion
- debian/patches/CVE-2013-4402.dpatch: set limits on number of filters
and nested packets in util/iobuf.c, g10/mainproc.c.
- CVE-2013-4402
-- Marc Deslauriers <email address hidden> Tue, 08 Oct 2013 07:49:58 -0400
-
gnupg (1.4.11-3ubuntu2.3) precise-security; urgency=low
* SECURITY UPDATE: The path of execution in an exponentiation function may
depend upon secret key data, allowing a local attacker to determine the
contents of the secret key through a side-channel attack.
- debian/patches/CVE-2013-4242.dpatch: always perform the mpi_mul for
exponents in secure memory. Based on upstream patch.
- CVE-2013-4242
-- Seth Arnold <email address hidden> Tue, 30 Jul 2013 15:51:17 -0700
-
gnupg (1.4.11-3ubuntu2.2) precise-security; urgency=low
* SECURITY UPDATE: keyring corruption via malformed key import
- debian/patches/CVE-2012-6085.dpatch: validate PKTTYPE in g10/import.c.
- CVE-2012-6085
-- Marc Deslauriers <email address hidden> Tue, 08 Jan 2013 10:52:55 -0500
-
gnupg (1.4.11-3ubuntu2.1) precise-security; urgency=low
* debian/patches/long-keyids.dpatch: Use the longest key ID available
when requesting a key from a key server.
-- Marc Deslauriers <email address hidden> Tue, 14 Aug 2012 08:34:24 -0400
-
gnupg (1.4.11-3ubuntu2) precise; urgency=low
* Mark gnupg, gnupg-curl, and gpgv Multi-Arch: foreign.
-- Colin Watson <email address hidden> Mon, 21 Nov 2011 13:42:07 +0000
-
gnupg (1.4.11-3ubuntu1) natty; urgency=low
* Resynchronise with Debian (LP: #720905). Remaining changes:
- Disable mlock() test since it fails with ulimit 0 (on buildds).
- Set gpg (or gpg2) and gpgsm to use a passphrase agent by default.
- Fix udeb build failure on powerpc, building with -O2 instead of -Os.
- Only suggest gnupg-curl and libldap; recommendations are pulled into
minimal, and we don't need the keyserver utilities in a minimal Ubuntu
system.
* debian/{control,rules}: Remove the Win32 build (and mingw32
build-dependency), since mingw32 is in universe, and will remain so for
the forseeable future.
gnupg (1.4.11-3) unstable; urgency=low
* Install gpg setuid root again on kFreeBSD. We dropped this
bit earlier because it's not necessary anymore on Linux, but
the kFreeBSD kernel still requires it for secure memory.
Thanks Robert Millan for the patch. (Closes: 598471)
* Add a gpgv-win32 package, to be used by win32-loader. Patch
from Didier Raboud (Closes: #612462).
gnupg (1.4.11-2) experimental; urgency=low
* Update standards-version to 3.9.1, no changes needed.
* Apply patch based on Werner Koch's work that (again)
resolves a build failure on mips(el); issue addressed
in 1.4.10-4 was only partly solved upstream.
* Add README.Debian with smart card reader info, thanks
Jonathan Nieder (Closes: #575763).
gnupg (1.4.11-1) experimental; urgency=low
* New upstream release (Closes: #600587).
+ Obsoletes all previously existing Debian patches:
567580_menu_prompt_reflects_program.dpatch
560692_fix_fatal_after_homedir_creation.dpatch
489225_catch_expired_primary_key_with_valid_subkey.dpatch
fix_infinite_loop_r5264.dpatch
567593_improve_info_and_faq.dpatch
551709_fix_info_link_entry.dpatch
560995_fix_ftbfs_on_sparc64.dpatch
mips_gcc4.4.dpatch
553175_document_primary_uid_sign.dpatch
+ No longer ships outdated faq.html.
* Update references to RFC 2440 into RFC 4880. Thanks
Christoph Anton Mitterer (Closes: #592294).
-- Rico Tzschichholz <email address hidden> Tue, 22 Feb 2011 11:00:25 +0100