-
libgcrypt20 (1.6.5-2ubuntu0.6) xenial-security; urgency=medium
* SECURITY UPDATE: ECDSA timing attack
- debian/patches/CVE-2019-13627.patch: add mitigation against timing
attack in cipher/ecc-ecdsa.c, mpi/ec.c.
- CVE-2019-13627
-- Marc Deslauriers <email address hidden> Mon, 13 Jan 2020 13:39:58 -0500
-
libgcrypt20 (1.6.5-2ubuntu0.5) xenial-security; urgency=medium
* SECURITY UPDATE: memory-cache side-channel attack on ECDSA signatures
- debian/patches/CVE-2018-0495.patch: add blinding for ECDSA in
cipher/ecc-ecdsa.c.
- CVE-2018-0495
-- Marc Deslauriers <email address hidden> Mon, 18 Jun 2018 09:30:10 -0400
-
libgcrypt20 (1.6.5-2ubuntu0.4) xenial; urgency=medium
* Disable the library reading /proc/sys/crypto/fips_enabled file
and going into FIPS mode. This fixes a hang on boot when using a
FIPS-enabled kernel with encrypted installations (LP: #1748310)
- debian/patches/disable_fips_enabled_read.patch
-- Vineetha Pai <email address hidden> Fri, 16 Feb 2018 13:31:19 -0500
-
libgcrypt20 (1.6.5-2ubuntu0.3) xenial-security; urgency=medium
* SECURITY UPDATE: full RSA key recovery via side-channel attack
- debian/patches/CVE-2017-7526-1.patch: simplify loop in mpi/mpi-pow.c.
- debian/patches/CVE-2017-7526-2.patch: use same computation for square
and multiply in mpi/mpi-pow.c.
- debian/patches/CVE-2017-7526-3.patch: add exponent blinding in
cipher/rsa.c.
- debian/patches/CVE-2017-7526-4.patch: add free to cipher/rsa.c.
- debian/patches/CVE-2017-7526-5.patch: add free to cipher/rsa.c.
- CVE-2017-7526
* SECURITY UPDATE: EdDSA key recovery via side-channel attack
- debian/patches/CVE-2017-9526-1.patch: store EdDSA session key in
secure memory in cipher/ecc-eddsa.c.
- debian/patches/CVE-2017-9526-2.patch: fix SEGV and stat calculation
src/secmem.c.
- CVE-2017-9526
-- Marc Deslauriers <email address hidden> Mon, 03 Jul 2017 08:16:37 -0400
-
libgcrypt20 (1.6.5-2ubuntu0.2) xenial-security; urgency=medium
* SECURITY UPDATE: random number generator prediction
- debian/patches/CVE-2016-6313-1.patch: improve the diagram showing the
random mixing in random/random-csprng.c.
- debian/patches/CVE-2016-6313-2.patch: hash continuous areas in the
csprng pool in random/random-csprng.c.
- CVE-2016-6313
* debian/rules: disable unaligned memory access on arm to fix FTBFS.
-- Marc Deslauriers <email address hidden> Thu, 18 Aug 2016 13:15:16 -0400
-
libgcrypt20 (1.6.5-2) unstable; urgency=medium
* serial-tests was added in automake 1.12, add versioned b-d.
* Upload to unstable.
-- Andreas Metzler <email address hidden> Wed, 10 Feb 2016 12:01:58 +0100
-
libgcrypt20 (1.6.4-5ubuntu1) xenial; urgency=medium
* SECURITY UPDATE: side-channel attack on ECDH
- debian/patches/CVE-2015-7511.patch: perform input validation and fix
error paths in cipher/ecc.c, use constant-time multiplication in
mpi/ec.c.
- CVE-2015-7511
-- Marc Deslauriers <email address hidden> Wed, 10 Feb 2016 10:54:55 -0500
-
libgcrypt20 (1.6.4-5) unstable; urgency=medium
* Move Vcs-* from git/http to https.
* Add 30_support_source_date_epoch.diff: Support setting BUILD_TIMESTAMP
using SOURCE_DATE_EPOCH through the SOURCE_DATE_EPOCH environment
variable. (Thanks, Jérémy Bobbio!). Use/b-d on dh-autoreconf instead of
autotools-dev. Closes: #812428
-- Andreas Metzler <email address hidden> Sun, 24 Jan 2016 16:00:41 +0100
-
libgcrypt20 (1.6.4-4) unstable; urgency=medium
* Delete build-aux/texinfo.tex and let texinfo use the system copy instead
to prevent breakage in pdf generation in UTF-8 locale. Closes: #803081
* Migrate from libgcrypt20-dbg to ddebs. dh_strip's --ddeb-migration
option was added to debhelper/unstable with version 9.20150628, bump
build-dependency accordingly.
-- Andreas Metzler <email address hidden> Fri, 25 Dec 2015 14:06:18 +0100
-
libgcrypt20 (1.6.4-3) unstable; urgency=medium
* Upload to unstable.
* Ship pdf instead of postscript docs.
-- Andreas Metzler <email address hidden> Sun, 18 Oct 2015 13:37:58 +0200
-
libgcrypt20 (1.6.3-2ubuntu1) wily; urgency=medium
* Merge from Debian unstable, remaining changes:
- debian/rules: Drop from -O3 to -O2 to work around FTBFS on ppc64el.
libgcrypt20 (1.6.3-2) unstable; urgency=medium
* Upload to unstable.
* Fix Vcs-Browser link.
libgcrypt20 (1.6.3-1) experimental; urgency=medium
* Use ascii-armored debian/upstream/signing-key.asc instead of
debian/upstream-signing-key.pgp for uscan's verification. This alllows us
to drop debian/source/include-binaries. Add 2071B08A33BD3F06 as accepted
key.
* New upstream release.
+ Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
+ Fixed data-dependent timing variations in modular exponentiation
[related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
are Practical].
-- Marc Deslauriers <email address hidden> Thu, 21 May 2015 08:06:59 -0400