gnupg (1.4.10-2ubuntu1.3) lucid-security; urgency=low

  * SECURITY UPDATE: The path of execution in an exponentiation function may
    depend upon secret key data, allowing a local attacker to determine the
    contents of the secret key through a side-channel attack.
    - debian/patches/CVE-2013-4242.dpatch: always perform the mpi_mul for
      exponents in secure memory. Based on upstream patch.
    - CVE-2013-4242

Date: 2013-07-31 00:59:15.717304+00:00
Changed-By: Seth Arnold <[email protected]>
https://launchpad.net/ubuntu/lucid/+source/gnupg/1.4.10-2ubuntu1.3
Sorry, changesfile not available.
-- 
Lucid-changes mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/lucid-changes

Reply via email to