libgcrypt11 (1.5.0-3ubuntu2.2) raring-security; urgency=low

  * SECURITY UPDATE: The path of execution in an exponentiation function may
    depend upon secret key data, allowing a local attacker to determine the
    contents of the secret key through a side-channel attack.
    - debian/patches/CVE-2013-4242.diff: always perform the mpi_mul for
      exponents in secure memory. Based on upstream patch.
    - CVE-2013-4242

Date: 2013-07-31 02:20:13.331500+00:00
Changed-By: Seth Arnold <[email protected]>
https://launchpad.net/ubuntu/raring/+source/libgcrypt11/1.5.0-3ubuntu2.2
Sorry, changesfile not available.
-- 
Raring-changes mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/raring-changes

Reply via email to