libgcrypt11 (1.5.0-3ubuntu2.2) raring-security; urgency=low
* SECURITY UPDATE: The path of execution in an exponentiation function may
depend upon secret key data, allowing a local attacker to determine the
contents of the secret key through a side-channel attack.
- debian/patches/CVE-2013-4242.diff: always perform the mpi_mul for
exponents in secure memory. Based on upstream patch.
- CVE-2013-4242
Date: 2013-07-31 02:20:13.331500+00:00
Changed-By: Seth Arnold <[email protected]>
https://launchpad.net/ubuntu/raring/+source/libgcrypt11/1.5.0-3ubuntu2.2
Sorry, changesfile not available.
--
Raring-changes mailing list
[email protected]
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/raring-changes