gnupg (1.4.12-7ubuntu1.1) raring-security; urgency=low

  * SECURITY UPDATE: The path of execution in an exponentiation function may
    depend upon secret key data, allowing a local attacker to determine the
    contents of the secret key through a side-channel attack.
    - debian/patches/CVE-2013-4242.diff: always perform the mpi_mul for
      exponents in secure memory. Based on upstream patch.
    - CVE-2013-4242

Date: 2013-07-31 01:02:15.003568+00:00
Changed-By: Seth Arnold <[email protected]>
https://launchpad.net/ubuntu/raring/+source/gnupg/1.4.12-7ubuntu1.1
Sorry, changesfile not available.
-- 
Raring-changes mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/raring-changes

Reply via email to