Change log for libgcrypt20 package in Ubuntu

173 of 73 results
Published in oracular-release
Deleted in oracular-proposed (Reason: Moved to oracular)
libgcrypt20 (1.10.3-3) unstable; urgency=medium

  * 30_m4-Include-_AM_PATH_GPGRT_CONFIG-definition.patch from upstream GIT
    master: Update libgcrypt.m4 to let AM_PATH_LIBGCRYPT continue to work
    without preceding AM_PATH_GPG_ERROR() when libgcrypt-config is removed.

 -- Andreas Metzler <email address hidden>  Tue, 14 May 2024 18:11:46 +0200
Superseded in oracular-release
Published in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
libgcrypt20 (1.10.3-2build1) noble; urgency=high

  * No change rebuild for 64-bit time_t and frame pointers.

 -- Julian Andres Klode <email address hidden>  Mon, 08 Apr 2024 18:03:56 +0200
Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
libgcrypt20 (1.10.3-2) unstable; urgency=medium

  * Upload to unstable.

 -- Andreas Metzler <email address hidden>  Fri, 01 Dec 2023 11:47:14 +0100
Published in jammy-proposed
libgcrypt20 (1.9.4-3ubuntu3.1) jammy; urgency=medium

  * sha3: fix sha3 output for inputs > 4 GiB LP: #2044852
    - d/p/0007-keccak-Use-size_t-to-avoid-integer-overflow.patch

 -- Tobias Heider <email address hidden>  Mon, 27 Nov 2023 22:12:24 +0100
Superseded in noble-release
Published in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
libgcrypt20 (1.10.2-3ubuntu1) mantic; urgency=medium

  * Merge with Debian unstable. Remaining changes:
    - d/p/disable_fips_enabled_read.patch
      Disable the library reading /proc/sys/crypto/fips_enabled file
      and going into FIPS mode.
      libgcrypt is not a FIPS certified library.
  * Dropped changes, not needed:
    - d/p/12_lessdeps_libgcrypt-config.diff: refresh patch offsets
  * For Ubuntu, this fixes an FTBFS by following Debian 1.10.2-3 in
    dropping the use of --insert-timestamp (LP: #2036527).

Superseded in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
libgcrypt20 (1.10.2-2ubuntu1) mantic; urgency=medium

  * Merge with Debian unstable. Remaining changes:
    - d/p/disable_fips_enabled_read.patch
      Disable the library reading /proc/sys/crypto/fips_enabled file
      and going into FIPS mode.
      libgcrypt is not a FIPS certified library.
    - d/p/12_lessdeps_libgcrypt-config.diff: refresh patch offsets

 -- Adrien Nader <email address hidden>  Mon, 10 Jul 2023 15:41:13 +0200
Superseded in mantic-release
Published in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
libgcrypt20 (1.10.1-3ubuntu1) lunar; urgency=medium

  * Merge from Debian unstable (LP: #2003529). Remaining changes:
    - d/p/disable_fips_enabled_read.patch
      Disable the library reading /proc/sys/crypto/fips_enabled file
      and going into FIPS mode.
      libgcrypt is not a FIPS certified library.

Superseded in lunar-release
Obsolete in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
libgcrypt20 (1.10.1-2ubuntu1) kinetic; urgency=low

  * Merge from Debian unstable. (LP: #1974277) Remaining changes:
    - d/p/disable_fips_enabled_read.patch
      Disable the library reading /proc/sys/crypto/fips_enabled file
      and going into FIPS mode.
      libgcrypt is not a FIPS certified library.
  * Removed d/p/0001-Always-include-config.h-in-cipher-assembly-codes.patch
    since it's already included in the new version.
  * Removed d/p/0001-poly1305-fix-building-with-arm-linux-gnueabihf-gcc-1.patch
    since it's already included in the new version.
  * Refreshed d/p/12_lessdeps_libgcrypt-config.diff
    and d/p/disable_fips_enabled_read.patch due to offsets.

Superseded in kinetic-release
Published in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
libgcrypt20 (1.9.4-3ubuntu3) jammy; urgency=high

  * No change rebuild for ppc64el baseline bump.

 -- Julian Andres Klode <email address hidden>  Thu, 24 Mar 2022 13:12:17 +0100
Superseded in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
libgcrypt20 (1.9.4-3ubuntu2) jammy; urgency=medium

  * Cherry-pick upstream patch to fix FTBFS on armhf.

Superseded in jammy-proposed
libgcrypt20 (1.9.4-3ubuntu1) jammy; urgency=medium

  * Merge from Debian unstable. Remaining changes:
    - Disable the library reading /proc/sys/crypto/fips_enabled file
      and going into FIPS mode. libgcrypt is not a FIPS certified library.
      (LP 1748310)
  * Drop CVE and CET patches, applied in Debian or upstreamed.
  * Cherry-pick one more patch from master to correctly enable assembly
    CET.

Available diffs

Superseded in jammy-release
Obsolete in impish-release
Deleted in impish-proposed (Reason: Moved to impish)
libgcrypt20 (1.8.7-5ubuntu2) impish; urgency=medium

  * SECURITY UPDATE: lack of exponent blinding in ElGamal encryption
    - debian/patches/CVE-2021-33560.patch: harden ElGamal by introducing
      exponent blinding too in cipher/elgamal.c.
    - CVE-2021-33560
  * SECURITY UPDATE: incorrect support of smaller K
    - debian/patches/CVE-2021-40528.patch: fix ElGamal encryption for other
      implementations in cipher/elgamal.c.
    - CVE-2021-40528

 -- Marc Deslauriers <email address hidden>  Thu, 16 Sep 2021 07:36:50 -0400

Available diffs

Published in focal-updates
Published in focal-security
libgcrypt20 (1.8.5-5ubuntu1.1) focal-security; urgency=medium

  * SECURITY UPDATE: lack of exponent blinding in ElGamal encryption
    - debian/patches/CVE-2021-33560.patch: harden ElGamal by introducing
      exponent blinding too in cipher/elgamal.c.
    - CVE-2021-33560
  * SECURITY UPDATE: incorrect support of smaller K
    - debian/patches/CVE-2021-40528.patch: fix ElGamal encryption for other
      implementations in cipher/elgamal.c.
    - CVE-2021-40528

 -- Marc Deslauriers <email address hidden>  Tue, 14 Sep 2021 14:36:24 -0400
Obsolete in hirsute-updates
Obsolete in hirsute-security
libgcrypt20 (1.8.7-2ubuntu2.1) hirsute-security; urgency=medium

  * SECURITY UPDATE: lack of exponent blinding in ElGamal encryption
    - debian/patches/CVE-2021-33560.patch: harden ElGamal by introducing
      exponent blinding too in cipher/elgamal.c.
    - CVE-2021-33560
  * SECURITY UPDATE: incorrect support of smaller K
    - debian/patches/CVE-2021-40528.patch: fix ElGamal encryption for other
      implementations in cipher/elgamal.c.
    - CVE-2021-40528

 -- Marc Deslauriers <email address hidden>  Tue, 14 Sep 2021 14:30:44 -0400
Published in bionic-updates
Published in bionic-security
libgcrypt20 (1.8.1-4ubuntu1.3) bionic-security; urgency=medium

  * SECURITY UPDATE: lack of exponent blinding in ElGamal encryption
    - debian/patches/CVE-2021-33560.patch: harden ElGamal by introducing
      exponent blinding too in cipher/elgamal.c.
    - CVE-2021-33560
  * SECURITY UPDATE: incorrect support of smaller K
    - debian/patches/CVE-2021-40528.patch: fix ElGamal encryption for other
      implementations in cipher/elgamal.c.
    - CVE-2021-40528

 -- Marc Deslauriers <email address hidden>  Tue, 14 Sep 2021 14:36:59 -0400
Superseded in impish-release
Deleted in impish-proposed (Reason: Moved to impish)
libgcrypt20 (1.8.7-5ubuntu1) impish; urgency=low

  * Merge from Debian unstable. Remaining changes:
    - Disable the library reading /proc/sys/crypto/fips_enabled file
      and going into FIPS mode. libgcrypt is not a FIPS certified library.
      (LP 1748310)
    - Enable CET.

Available diffs

Superseded in impish-release
Obsolete in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
libgcrypt20 (1.8.7-2ubuntu2) hirsute; urgency=medium

  * No-change rebuild to drop the udeb package.

 -- Matthias Klose <email address hidden>  Mon, 22 Feb 2021 10:34:38 +0100

Available diffs

Superseded in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
libgcrypt20 (1.8.7-2ubuntu1) hirsute; urgency=low

  * Merge from Debian unstable. Remaining changes:
    - Disable the library reading /proc/sys/crypto/fips_enabled file
      and going into FIPS mode. libgcrypt is not a FIPS certified library.
      (LP 1748310)
    - Enable CET.

Available diffs

Superseded in hirsute-release
Obsolete in groovy-release
Deleted in groovy-proposed (Reason: moved to Release)
libgcrypt20 (1.8.5-5ubuntu2) groovy; urgency=medium

  * Enable CET.

 -- Dimitri John Ledkov <email address hidden>  Fri, 26 Jun 2020 14:12:25 +0100

Available diffs

Superseded in groovy-release
Published in focal-release
Deleted in focal-proposed (Reason: moved to Release)
libgcrypt20 (1.8.5-5ubuntu1) focal; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - Disable the library reading /proc/sys/crypto/fips_enabled file
      and going into FIPS mode. libgcrypt is not a FIPS certified library.
      (LP 1748310)

Available diffs

Published in xenial-updates
Published in xenial-security
libgcrypt20 (1.6.5-2ubuntu0.6) xenial-security; urgency=medium

  * SECURITY UPDATE: ECDSA timing attack
    - debian/patches/CVE-2019-13627.patch: add mitigation against timing
      attack in cipher/ecc-ecdsa.c, mpi/ec.c.
    - CVE-2019-13627

 -- Marc Deslauriers <email address hidden>  Mon, 13 Jan 2020 13:39:58 -0500
Superseded in bionic-updates
Superseded in bionic-security
libgcrypt20 (1.8.1-4ubuntu1.2) bionic-security; urgency=medium

  * SECURITY UPDATE: ECDSA timing attack
    - debian/patches/CVE-2019-13627-1.patch: add mitigation against timing
      attack in cipher/ecc-ecdsa.c, mpi/ec.c.
    - debian/patches/CVE-2019-13627-2.patch: fix use of nonce, use larger
      one in cipher/dsa-common.c, cipher/dsa.c, cipher/ecc-ecdsa.c,
      cipher/ecc-gost.c, cipher/pubkey-internal.h.
    - CVE-2019-13627

 -- Marc Deslauriers <email address hidden>  Thu, 28 Nov 2019 13:53:53 -0500
Obsolete in disco-updates
Obsolete in disco-security
libgcrypt20 (1.8.4-3ubuntu1.1) disco-security; urgency=medium

  * SECURITY UPDATE: ECDSA timing attack
    - debian/patches/CVE-2019-13627-1.patch: add mitigation against timing
      attack in cipher/ecc-ecdsa.c, mpi/ec.c.
    - debian/patches/CVE-2019-13627-2.patch: fix use of nonce, use larger
      one in cipher/dsa-common.c, cipher/dsa.c, cipher/ecc-ecdsa.c,
      cipher/ecc-gost.c, cipher/pubkey-internal.h.
    - CVE-2019-13627

 -- Marc Deslauriers <email address hidden>  Thu, 28 Nov 2019 13:53:23 -0500
Obsolete in eoan-updates
Obsolete in eoan-security
libgcrypt20 (1.8.4-5ubuntu2.1) eoan-security; urgency=medium

  * SECURITY UPDATE: ECDSA timing attack
    - debian/patches/CVE-2019-13627-1.patch: add mitigation against timing
      attack in cipher/ecc-ecdsa.c, mpi/ec.c.
    - debian/patches/CVE-2019-13627-2.patch: fix use of nonce, use larger
      one in cipher/dsa-common.c, cipher/dsa.c, cipher/ecc-ecdsa.c,
      cipher/ecc-gost.c, cipher/pubkey-internal.h.
    - CVE-2019-13627

 -- Marc Deslauriers <email address hidden>  Thu, 28 Nov 2019 13:50:59 -0500
Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
libgcrypt20 (1.8.5-3ubuntu1) focal; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - Disable the library reading /proc/sys/crypto/fips_enabled file
      and going into FIPS mode. libgcrypt is not a FIPS certified library.
      (LP 1748310)
  * Dropped changes, included in Debian:
    - Build-depend on texlive-plain-generic instead of obsolete texlive-
      generic-recommended.

Available diffs

Superseded in focal-release
Obsolete in eoan-release
Deleted in eoan-proposed (Reason: moved to Release)
libgcrypt20 (1.8.4-5ubuntu2) eoan; urgency=medium

  * Build-depend on texlive-plain-generic instead of obsolete texlive-
    generic-recommended.

 -- Steve Langasek <email address hidden>  Tue, 01 Oct 2019 14:13:42 -0700

Available diffs

Superseded in eoan-release
Deleted in eoan-proposed (Reason: moved to release)
libgcrypt20 (1.8.4-5ubuntu1) eoan; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - Disable the library reading /proc/sys/crypto/fips_enabled file
      and going into FIPS mode. libgcrypt is not a FIPS certified library.
      (LP 1748310)
  * Fix spelling-error-in-patch-description "Decription" -> "Description"

Available diffs

Superseded in eoan-release
Obsolete in disco-release
Deleted in disco-proposed (Reason: moved to release)
libgcrypt20 (1.8.4-3ubuntu1) disco; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - Disable the library reading /proc/sys/crypto/fips_enabled file
      and going into FIPS mode. libgcrypt is not a FIPS certified library.
      (LP 1748310)

Available diffs

Superseded in disco-release
Obsolete in cosmic-release
Deleted in cosmic-proposed (Reason: moved to release)
libgcrypt20 (1.8.3-1ubuntu1) cosmic; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - Disable the library reading /proc/sys/crypto/fips_enabled file
      and going into FIPS mode. libgcrypt is not a FIPS certified library.
      (LP 1748310)

Available diffs

Obsolete in artful-updates
Obsolete in artful-security
libgcrypt20 (1.7.8-2ubuntu1.1) artful-security; urgency=medium

  * SECURITY UPDATE: memory-cache side-channel attack on ECDSA signatures
    - debian/patches/CVE-2018-0495.patch: add blinding for ECDSA in
      cipher/ecc-ecdsa.c.
    - CVE-2018-0495

 -- Marc Deslauriers <email address hidden>  Mon, 18 Jun 2018 09:29:48 -0400
Superseded in bionic-updates
Superseded in bionic-security
libgcrypt20 (1.8.1-4ubuntu1.1) bionic-security; urgency=medium

  * SECURITY UPDATE: memory-cache side-channel attack on ECDSA signatures
    - debian/patches/CVE-2018-0495.patch: add blinding for ECDSA in
      cipher/ecc-ecdsa.c.
    - CVE-2018-0495

 -- Marc Deslauriers <email address hidden>  Mon, 18 Jun 2018 09:28:30 -0400
Superseded in xenial-updates
Superseded in xenial-security
libgcrypt20 (1.6.5-2ubuntu0.5) xenial-security; urgency=medium

  * SECURITY UPDATE: memory-cache side-channel attack on ECDSA signatures
    - debian/patches/CVE-2018-0495.patch: add blinding for ECDSA in
      cipher/ecc-ecdsa.c.
    - CVE-2018-0495

 -- Marc Deslauriers <email address hidden>  Mon, 18 Jun 2018 09:30:10 -0400
Superseded in cosmic-release
Deleted in cosmic-proposed (Reason: moved to release)
libgcrypt20 (1.8.2-2ubuntu1) cosmic; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - Disable the library reading /proc/sys/crypto/fips_enabled file
      and going into FIPS mode. libgcrypt is not a FIPS certified library.
      (LP 1748310)

Available diffs

Superseded in xenial-updates
Deleted in xenial-proposed (Reason: moved to -updates)
libgcrypt20 (1.6.5-2ubuntu0.4) xenial; urgency=medium

  * Disable the library reading /proc/sys/crypto/fips_enabled file
    and going into FIPS mode. This fixes a hang on boot when using a
    FIPS-enabled kernel with encrypted installations (LP: #1748310)
    - debian/patches/disable_fips_enabled_read.patch

 -- Vineetha Pai <email address hidden>  Fri, 16 Feb 2018 13:31:19 -0500
Superseded in cosmic-release
Published in bionic-release
Deleted in bionic-proposed (Reason: moved to release)
libgcrypt20 (1.8.1-4ubuntu1) bionic; urgency=medium

  * Disable the library reading /proc/sys/crypto/fips_enabled file
    and going into FIPS mode. libgcrypt is not a FIPS certified library.
    (LP: #1748310)
    - debian/patches/disable_fips_enabled_read.patch

 -- Vineetha Pai <email address hidden>  Fri, 16 Feb 2018 13:45:04 -0500
Superseded in bionic-release
Deleted in bionic-proposed (Reason: moved to release)
libgcrypt20 (1.8.1-4) unstable; urgency=low

  * Upload to unstable.

 -- Andreas Metzler <email address hidden>  Wed, 15 Nov 2017 18:52:21 +0100

Available diffs

Superseded in bionic-proposed
libgcrypt20 (1.7.9-2) unstable; urgency=medium

  * Sync debian/copyright with upstream's LICENSES file, adding the OCB
    license 1. Closes: #879984
  * [lintian] Drop trailing whitespace in control and changelog.
  * [lintian] Sync priorities with override file (extra -> optional).
  * [lintian] Fix typo in copyright file.

 -- Andreas Metzler <email address hidden>  Sat, 04 Nov 2017 16:37:16 +0100

Available diffs

Superseded in bionic-release
Obsolete in artful-release
Deleted in artful-proposed (Reason: moved to release)
libgcrypt20 (1.7.8-2ubuntu1) artful; urgency=medium

  * SECURITY UPDATE: Curve25519 side-channel attack
    - debian/patches/CVE-2017-0379.patch: add input validation for X25519
      to cipher/ecc.c, mpi/ec.c, src/mpi.h.
    - CVE-2017-0379

 -- Marc Deslauriers <email address hidden>  Thu, 14 Sep 2017 07:14:32 -0400
Obsolete in zesty-updates
Obsolete in zesty-security
libgcrypt20 (1.7.6-1ubuntu0.2) zesty-security; urgency=medium

  * SECURITY UPDATE: Curve25519 side-channel attack
    - debian/patches/CVE-2017-0379.patch: add input validation for X25519
      to cipher/ecc.c, mpi/ec.c, src/mpi.h.
    - CVE-2017-0379

 -- Marc Deslauriers <email address hidden>  Thu, 14 Sep 2017 07:12:13 -0400
Superseded in bionic-release
Deleted in bionic-proposed (Reason: moved to release)
libgcrypt20 (1.7.9-1) unstable; urgency=high

  * New upstream version, mitigates a local side-channel attack on Curve25519
    dubbed "May the Fourth be With You".  [CVE-2017-0379] Closes: #873383
    + Drop 30_mpi-Fix-mpi_set_secure.patch

 -- Andreas Metzler <email address hidden>  Sun, 27 Aug 2017 11:56:17 +0200
Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
libgcrypt20 (1.7.8-2) unstable; urgency=medium

  * 30_mpi-Fix-mpi_set_secure.patch from upstream LIBGCRYPT-1-7-BRANCH: Fix
    memory allocation in mpi_set_secure. Closes: #866964
  * Drop override_dh_strip from debian/rules.

 -- Andreas Metzler <email address hidden>  Thu, 06 Jul 2017 18:16:23 +0200

Available diffs

Obsolete in yakkety-updates
Obsolete in yakkety-security
libgcrypt20 (1.7.2-2ubuntu1.1) yakkety-security; urgency=medium

  * SECURITY UPDATE: full RSA key recovery via side-channel attack
    - debian/patches/CVE-2017-7526-1.patch: simplify loop in mpi/mpi-pow.c.
    - debian/patches/CVE-2017-7526-2.patch: use same computation for square
      and multiply in mpi/mpi-pow.c.
    - debian/patches/CVE-2017-7526-3.patch: add exponent blinding in
      cipher/rsa.c.
    - debian/patches/CVE-2017-7526-4.patch: add free to cipher/rsa.c.
    - debian/patches/CVE-2017-7526-5.patch: add free to cipher/rsa.c.
    - CVE-2017-7526
  * SECURITY UPDATE: EdDSA key recovery via side-channel attack
    - debian/patches/CVE-2017-9526-1.patch: store EdDSA session key in
      secure memory in cipher/ecc-eddsa.c.
    - debian/patches/CVE-2017-9526-2.patch: fix SEGV and stat calculation
      src/secmem.c.
    - CVE-2017-9526

 -- Marc Deslauriers <email address hidden>  Mon, 03 Jul 2017 08:15:20 -0400
Superseded in xenial-updates
Superseded in xenial-security
libgcrypt20 (1.6.5-2ubuntu0.3) xenial-security; urgency=medium

  * SECURITY UPDATE: full RSA key recovery via side-channel attack
    - debian/patches/CVE-2017-7526-1.patch: simplify loop in mpi/mpi-pow.c.
    - debian/patches/CVE-2017-7526-2.patch: use same computation for square
      and multiply in mpi/mpi-pow.c.
    - debian/patches/CVE-2017-7526-3.patch: add exponent blinding in
      cipher/rsa.c.
    - debian/patches/CVE-2017-7526-4.patch: add free to cipher/rsa.c.
    - debian/patches/CVE-2017-7526-5.patch: add free to cipher/rsa.c.
    - CVE-2017-7526
  * SECURITY UPDATE: EdDSA key recovery via side-channel attack
    - debian/patches/CVE-2017-9526-1.patch: store EdDSA session key in
      secure memory in cipher/ecc-eddsa.c.
    - debian/patches/CVE-2017-9526-2.patch: fix SEGV and stat calculation
      src/secmem.c.
    - CVE-2017-9526

 -- Marc Deslauriers <email address hidden>  Mon, 03 Jul 2017 08:16:37 -0400
Superseded in zesty-updates
Superseded in zesty-security
libgcrypt20 (1.7.6-1ubuntu0.1) zesty-security; urgency=medium

  * SECURITY UPDATE: full RSA key recovery via side-channel attack
    - debian/patches/CVE-2017-7526-1.patch: simplify loop in mpi/mpi-pow.c.
    - debian/patches/CVE-2017-7526-2.patch: use same computation for square
      and multiply in mpi/mpi-pow.c.
    - debian/patches/CVE-2017-7526-3.patch: add exponent blinding in
      cipher/rsa.c.
    - debian/patches/CVE-2017-7526-4.patch: add free to cipher/rsa.c.
    - debian/patches/CVE-2017-7526-5.patch: add free to cipher/rsa.c.
    - CVE-2017-7526
  * SECURITY UPDATE: EdDSA key recovery via side-channel attack
    - debian/patches/CVE-2017-9526-1.patch: store EdDSA session key in
      secure memory in cipher/ecc-eddsa.c.
    - debian/patches/CVE-2017-9526-2.patch: fix SEGV and stat calculation
      src/secmem.c.
    - CVE-2017-9526

 -- Marc Deslauriers <email address hidden>  Mon, 03 Jul 2017 08:00:00 -0400
Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
libgcrypt20 (1.7.8-1) unstable; urgency=high

  * Fix 25_norevisionfromgit.diff to let ./configure generate a version-string
    without -beta suffix. LP: #1700157
  * New upstream version.
    + Mitigate a flush+reload side-channel attack on RSA secret keys dubbed
      "Sliding right into disaster".  For details see
      <https://eprint.iacr.org/2017/627>.  [CVE-2017-7526]

 -- Andreas Metzler <email address hidden>  Thu, 29 Jun 2017 18:27:03 +0200

Available diffs

Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
libgcrypt20 (1.7.7-2) unstable; urgency=low

  * Upload to unstable.

 -- Andreas Metzler <email address hidden>  Sun, 18 Jun 2017 11:28:58 +0200

Available diffs

Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
libgcrypt20 (1.7.6-2) unstable; urgency=high

  * Refresh debian/upstream/signing-key.asc, key-expiry-dates bumped.
  * Pull two fixes from gcrypt 1.7.7 bugfix release:
    + 30_gcry177_01-ecc-Store-EdDSA-session-key-in-secure-memory.patch
      Fix possible timing attack on EdDSA session key.
    + 30_gcry177_02-secmem-Fix-SEGV-and-stat-calculation.patch
      Fix long standing bug in secure memory implementation which could lead
      to a segv on free.

 -- Andreas Metzler <email address hidden>  Sat, 03 Jun 2017 10:58:36 +0200

Available diffs

Superseded in artful-release
Obsolete in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
libgcrypt20 (1.7.6-1) unstable; urgency=medium

  * New upstream version, includes
    30_rijndael-ssse3-fix-counter-operand-from-read-only-to.patch.

 -- Andreas Metzler <email address hidden>  Thu, 26 Jan 2017 11:58:32 +0100

Available diffs

Superseded in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
libgcrypt20 (1.7.5-3) unstable; urgency=medium

  * 30_rijndael-ssse3-fix-counter-operand-from-read-only-to.patch from
    upstream GIT master: Fix SSE3 assembly on Nehalem.

 -- Andreas Metzler <email address hidden>  Sat, 14 Jan 2017 11:06:04 +0100

Available diffs

Superseded in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
libgcrypt20 (1.7.5-2) unstable; urgency=medium

  * Upload to unstable.

 -- Andreas Metzler <email address hidden>  Sat, 17 Dec 2016 08:38:47 +0100

Available diffs

Superseded in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
libgcrypt20 (1.7.3-2) unstable; urgency=medium

  [ Helmut Grohne / Andreas Metzler ]
  * Turn libgcrypt11-dev into an Arch:any package. Closes: #840205

 -- Andreas Metzler <email address hidden>  Sun, 09 Oct 2016 18:00:59 +0200
Superseded in xenial-updates
Superseded in xenial-security
libgcrypt20 (1.6.5-2ubuntu0.2) xenial-security; urgency=medium

  * SECURITY UPDATE: random number generator prediction
    - debian/patches/CVE-2016-6313-1.patch: improve the diagram showing the
      random mixing in random/random-csprng.c.
    - debian/patches/CVE-2016-6313-2.patch: hash continuous areas in the
      csprng pool in random/random-csprng.c.
    - CVE-2016-6313
  * debian/rules: disable unaligned memory access on arm to fix FTBFS.

 -- Marc Deslauriers <email address hidden>  Thu, 18 Aug 2016 13:15:16 -0400
Superseded in zesty-release
Obsolete in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
libgcrypt20 (1.7.2-2ubuntu1) yakkety; urgency=medium

  * SECURITY UPDATE: random number generator prediction
    - debian/patches/CVE-2016-6313-1.patch: improve the diagram showing the
      random mixing in random/random-csprng.c.
    - debian/patches/CVE-2016-6313-2.patch: hash continuous areas in the
      csprng pool in random/random-csprng.c.
    - CVE-2016-6313

 -- Marc Deslauriers <email address hidden>  Wed, 17 Aug 2016 13:42:24 -0400
Superseded in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
libgcrypt20 (1.7.2-2) unstable; urgency=low

  * Upload to unstable.

 -- Andreas Metzler <email address hidden>  Sun, 17 Jul 2016 15:32:09 +0200

Available diffs

Superseded in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
libgcrypt20 (1.7.1-2) unstable; urgency=medium

  * Upload to unstable.

 -- Andreas Metzler <email address hidden>  Sat, 18 Jun 2016 07:24:03 +0200

Available diffs

Superseded in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
libgcrypt20 (1.7.0-2) unstable; urgency=low

  * Upload to unstable.

 -- Andreas Metzler <email address hidden>  Sun, 17 Apr 2016 13:16:30 +0200

Available diffs

Superseded in xenial-proposed
libgcrypt20 (1.6.4-5ubuntu1) xenial; urgency=medium

  * SECURITY UPDATE: side-channel attack on ECDH
    - debian/patches/CVE-2015-7511.patch: perform input validation and fix
      error paths in cipher/ecc.c, use constant-time multiplication in
      mpi/ec.c.
    - CVE-2015-7511

 -- Marc Deslauriers <email address hidden>  Wed, 10 Feb 2016 10:54:55 -0500
Obsolete in wily-updates
Obsolete in wily-security
libgcrypt20 (1.6.3-2ubuntu1.1) wily-security; urgency=medium

  * SECURITY UPDATE: side-channel attack on ECDH
    - debian/patches/CVE-2015-7511.patch: perform input validation and fix
      error paths in cipher/ecc.c, use constant-time multiplication in
      mpi/ec.c.
    - CVE-2015-7511

 -- Marc Deslauriers <email address hidden>  Wed, 10 Feb 2016 10:59:23 -0500
Superseded in yakkety-release
Published in xenial-release
Deleted in xenial-proposed (Reason: moved to release)
libgcrypt20 (1.6.5-2) unstable; urgency=medium

  * serial-tests was added in automake 1.12, add versioned b-d.
  * Upload to unstable.

 -- Andreas Metzler <email address hidden>  Wed, 10 Feb 2016 12:01:58 +0100
Superseded in xenial-release
Deleted in xenial-proposed (Reason: moved to release)
libgcrypt20 (1.6.4-5) unstable; urgency=medium

  * Move Vcs-* from git/http to https.
  * Add 30_support_source_date_epoch.diff: Support setting BUILD_TIMESTAMP
    using SOURCE_DATE_EPOCH through the SOURCE_DATE_EPOCH environment
    variable. (Thanks, Jérémy Bobbio!). Use/b-d on dh-autoreconf instead of
    autotools-dev. Closes: #812428

 -- Andreas Metzler <email address hidden>  Sun, 24 Jan 2016 16:00:41 +0100

Available diffs

Superseded in xenial-release
Deleted in xenial-proposed (Reason: moved to release)
libgcrypt20 (1.6.4-4) unstable; urgency=medium

  * Delete build-aux/texinfo.tex and let texinfo use the system copy instead
    to prevent breakage in pdf generation in UTF-8 locale. Closes: #803081
  * Migrate from libgcrypt20-dbg to ddebs. dh_strip's --ddeb-migration
    option was added to debhelper/unstable with version 9.20150628, bump
    build-dependency accordingly.

 -- Andreas Metzler <email address hidden>  Fri, 25 Dec 2015 14:06:18 +0100

Available diffs

Superseded in xenial-release
Deleted in xenial-proposed (Reason: moved to release)
libgcrypt20 (1.6.4-3) unstable; urgency=medium

  * Upload to unstable.
  * Ship pdf instead of postscript docs.

 -- Andreas Metzler <email address hidden>  Sun, 18 Oct 2015 13:37:58 +0200
Superseded in xenial-release
Obsolete in wily-release
Deleted in wily-proposed (Reason: moved to release)
libgcrypt20 (1.6.3-2ubuntu1) wily; urgency=medium

  * Merge from Debian unstable, remaining changes:
    - debian/rules: Drop from -O3 to -O2 to work around FTBFS on ppc64el.

Available diffs

Superseded in wily-release
Obsolete in vivid-release
Deleted in vivid-proposed (Reason: moved to release)
libgcrypt20 (1.6.2-4ubuntu2) vivid; urgency=medium

  * SECURITY UPDATE: sidechannel attack on Elgamal
    - debian/patches/CVE-2014-3591.patch: use ciphertext blinding in
      cipher/elgamal.c.
    - CVE-2014-3591
  * SECURITY UPDATE: sidechannel attack via timing variations in mpi_powm
    - debian/patches/CVE-2015-0837.patch: avoid timing variations in
      mpi/mpi-pow.c, mpi/mpiutil.c, src/mpi.h.
    - CVE-2015-0837
 -- Marc Deslauriers <email address hidden>   Thu, 26 Mar 2015 07:17:50 -0400

Available diffs

Obsolete in utopic-updates
Obsolete in utopic-security
libgcrypt20 (1.6.1-2ubuntu1.14.10.1) utopic-security; urgency=medium

  * SECURITY UPDATE: sidechannel attack on Elgamal
    - debian/patches/CVE-2014-3591.patch: use ciphertext blinding in
      cipher/elgamal.c.
    - CVE-2014-3591
  * SECURITY UPDATE: sidechannel attack via timing variations in mpi_powm
    - debian/patches/CVE-2015-0837.patch: avoid timing variations in
      mpi/mpi-pow.c, mpi/mpiutil.c, src/mpi.h.
    - CVE-2015-0837
 -- Marc Deslauriers <email address hidden>   Thu, 26 Mar 2015 07:24:13 -0400
Published in trusty-updates
Published in trusty-security
libgcrypt20 (1.6.1-2ubuntu1.14.04.1) trusty-security; urgency=medium

  * SECURITY UPDATE: sidechannel attack on Elgamal
    - debian/patches/CVE-2014-3591.patch: use ciphertext blinding in
      cipher/elgamal.c.
    - CVE-2014-3591
  * SECURITY UPDATE: sidechannel attack via timing variations in mpi_powm
    - debian/patches/CVE-2015-0837.patch: avoid timing variations in
      mpi/mpi-pow.c, mpi/mpiutil.c, src/mpi.h.
    - CVE-2015-0837
 -- Marc Deslauriers <email address hidden>   Thu, 26 Mar 2015 07:25:12 -0400
Superseded in vivid-release
Deleted in vivid-proposed (Reason: moved to release)
libgcrypt20 (1.6.2-4ubuntu1) vivid; urgency=medium

  * Merge from Debian unstable, remaining changes:
    - debian/rules: Drop from -O3 to -O2 to work around FTBFS on ppc64el.

Available diffs

Superseded in vivid-release
Obsolete in utopic-release
Superseded in utopic-release
Published in trusty-release
Deleted in trusty-proposed (Reason: moved to release)
libgcrypt20 (1.6.1-2ubuntu1) trusty; urgency=medium

  * debian/rules: Drop from -O3 to -O2 to work around FTBFS on ppc64el.
 -- Adam Conrad <email address hidden>   Thu, 20 Mar 2014 19:32:09 -0600
Superseded in trusty-release
Deleted in trusty-proposed (Reason: moved to release)
libgcrypt20 (1.6.1-2) unstable; urgency=medium


  * libgcrypt20-dev does not provide libgcrypt-dev anymore and conflicts with
    libgcrypt11-dev in addition to the virtual package libgcrypt-dev.
    The previous setup of having libgcryptXX-dev provide/conflict
    libgcrypt-dev breaks for packages build-depending on the virtual package.
    Closes: #741959

 -- Andreas Metzler <email address hidden>  Mon, 17 Mar 2014 19:14:23 +0100

Available diffs

Deleted in trusty-release (Reason: We don't want this transition in trusty)
Deleted in trusty-proposed (Reason: moved to release)
libgcrypt20 (1.6.1-1) unstable; urgency=medium


  * New upstream version.
    + New member in gcry_md_flags, bump dependency version of gcry_md_open().
    + GCRYCTL_INACTIVATE_FIPS_FLAG/GCRYCTL_REACTIVATE_FIPS_FLAG reserved but
      returning a GPG_ERR_NOT_IMPLEMENTED yet. Bump dependency version of
      gcry_control().
  * Fix c'n'p error in Vcs-Git field. Closes: #737022

 -- Andreas Metzler <email address hidden>  Wed, 29 Jan 2014 16:21:56 +0100
Superseded in trusty-release
Deleted in trusty-proposed (Reason: moved to release)
libgcrypt20 (1.6.0-2ubuntu2) trusty; urgency=medium

  * Add blowfish-arm.S and serpent-armv7-neon.S, not included in the
    upstream release.
 -- Matthias Klose <email address hidden>   Wed, 29 Jan 2014 12:25:17 +0000
Superseded in trusty-proposed
libgcrypt20 (1.6.0-2ubuntu1) trusty; urgency=medium

  * Don't try to build blowfish-arm, not included in the sources.
 -- Matthias Klose <email address hidden>   Wed, 29 Jan 2014 12:25:17 +0000
Superseded in trusty-release
Deleted in trusty-proposed (Reason: moved to release)
libgcrypt20 (1.6.0-2) unstable; urgency=low


  * Upload to unstable.
  * Add description to 12_lessdeps_libgcrypt-config.diff.

 -- Andreas Metzler <email address hidden>  Sat, 04 Jan 2014 13:15:57 +0100
173 of 73 results