Your message dated Sat, 27 Jul 2013 07:03:01 +0000
with message-id <e1v2ywr-0004x1...@franck.debian.org>
and subject line Bug#717880: fixed in gnupg 1.4.14-1
has caused the Debian Bug report #717880,
regarding gnupg: CVE-2013-4242: Yarom/Falkner flush+reload side-channel attack 
on RSA secret keys
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
717880: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: gnupg
Version: 1.4.12-7
Severity: critical
Tags: security
Justification: root security hole


Hi.

There is a fix available upstream for the Yarom/Falkner flush+reload
side-channel attack.

See this announcement:
http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html


Cheers,
Chris.

--- End Message ---
--- Begin Message ---
Source: gnupg
Source-Version: 1.4.14-1

We believe that the bug you reported is fixed in the latest version of
gnupg, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 717...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thijs Kinkhorst <th...@debian.org> (supplier of updated gnupg package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Thu, 25 Jul 2013 21:50:32 +0200
Source: gnupg
Binary: gnupg gnupg-curl gpgv gnupg-udeb gpgv-udeb gpgv-win32
Architecture: source all amd64
Version: 1.4.14-1
Distribution: unstable
Urgency: low
Maintainer: Debian GnuPG-Maintainers <pkg-gnupg-ma...@lists.alioth.debian.org>
Changed-By: Thijs Kinkhorst <th...@debian.org>
Description: 
 gnupg      - GNU privacy guard - a free PGP replacement
 gnupg-curl - GNU privacy guard - a free PGP replacement (cURL)
 gnupg-udeb - GNU privacy guard - a free PGP replacement (udeb)
 gpgv       - GNU privacy guard - signature verification tool
 gpgv-udeb  - minimal signature verification tool (udeb)
 gpgv-win32 - GNU privacy guard - signature verification tool (win32 build)
Closes: 399904 691392 717845 717880
Changes: 
 gnupg (1.4.14-1) unstable; urgency=low
 .
   * New upstream release (closes: #717845).
     - Adds IDEA support. Update package description.
     - Fixes security issue: side channel attack on RSA.
       (CVE-2013-4242, closes: #717880).
     - Fixes list-keys hanging at ctrl-C (closes: #399904).
   * Add more smartcard reader udev rules, thanks Niibe Yutaka
     (closes: #691392).
   * Checked for policy 3.9.4, no changes.
Checksums-Sha1: 
 2c5d6f1e4b560024285937051cdf6f48d0d1042b 1968 gnupg_1.4.14-1.dsc
 607691dd42a24f39fd74dded20375c4c0bc47d2c 5086642 gnupg_1.4.14.orig.tar.gz
 f94d2989817c0d95a14f811aac042a5c4b7f1616 26999 gnupg_1.4.14-1.debian.tar.gz
 0ae420ba21032b3f26f8be127df8cac514320170 654154 gpgv-win32_1.4.14-1_all.deb
 8709e80ffdd2bbaae202e755763a85c7ec5875e2 1987166 gnupg_1.4.14-1_amd64.deb
 9fddb346225bdbe0aceaf088b4c9a4970082391a 63826 gnupg-curl_1.4.14-1_amd64.deb
 05d613d3a6017cf91fc80836a56b595dbe5d25f8 225636 gpgv_1.4.14-1_amd64.deb
 fae81c5b5727533b0db2a623060d75a74cbc366c 353582 gnupg-udeb_1.4.14-1_amd64.udeb
 1740a9666dc8bc19a495586026cfed78d791ac22 130310 gpgv-udeb_1.4.14-1_amd64.udeb
Checksums-Sha256: 
 72973397a4e80e9997e547d4abc11b99af7ded38fa14d9be5a4ea183dae61e3d 1968 
gnupg_1.4.14-1.dsc
 03ea5dfea5063f0a5990331a359d27b45ebce35cfe3776f88455ef826cbbf64f 5086642 
gnupg_1.4.14.orig.tar.gz
 3db12fcb3ea8b00b1b0852a60d63a2da5c74066aaa9136f155ea164f394bbe9f 26999 
gnupg_1.4.14-1.debian.tar.gz
 6f980424cdbf40d3a00f13f33fd0873ed5cf8d5f9d1e56af109e66d78da11846 654154 
gpgv-win32_1.4.14-1_all.deb
 3cb24f6d913828ae52ba1f7234ae9d473aef370419df809db3ae841faa8c43c8 1987166 
gnupg_1.4.14-1_amd64.deb
 b32c18598d53d048554ba7552713c93514c6e06d9d782371b2f3064ebfc7f36e 63826 
gnupg-curl_1.4.14-1_amd64.deb
 bd55613026c620f47677b6236eb0b9cd69abd28037199ae7c1cce815c79ba51f 225636 
gpgv_1.4.14-1_amd64.deb
 2f9ae3cb57ca74072ad8c0d28005ce5e84e6c06db2c3ca12e643057f9ca8df39 353582 
gnupg-udeb_1.4.14-1_amd64.udeb
 c21482722fe6f2e729c66d905625a61efd8e6b50719cb54af7a0375f99853481 130310 
gpgv-udeb_1.4.14-1_amd64.udeb
Files: 
 e37a17dce947a309e31908fa05ecbf16 1968 utils important gnupg_1.4.14-1.dsc
 63f43ee0b5734a97c2c791428e1d8062 5086642 utils important 
gnupg_1.4.14.orig.tar.gz
 84d303ce1b183ee120b6c5d885429c62 26999 utils important 
gnupg_1.4.14-1.debian.tar.gz
 93a94edb666e4b39dbbe85511ca2e00f 654154 utils extra gpgv-win32_1.4.14-1_all.deb
 22901fc90e329155f02f13da3f8c86e3 1987166 utils important 
gnupg_1.4.14-1_amd64.deb
 adf8c0a2f039ad339742b7058b038031 63826 utils optional 
gnupg-curl_1.4.14-1_amd64.deb
 e013e08bb53f4d27b15459e629429024 225636 utils important gpgv_1.4.14-1_amd64.deb
 d7456e8e3df15047a0779237239e8d9f 353582 debian-installer extra 
gnupg-udeb_1.4.14-1_amd64.udeb
 703292ff74e83ca2078bb8ba3328bb34 130310 debian-installer extra 
gpgv-udeb_1.4.14-1_amd64.udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)

iQEcBAEBAgAGBQJR8287AAoJEFb2GnlAHawEpPAIAJ0mKQPIaS56xgacwX87KQ6+
gNnHA2VRl7HEqU1wdS82tybWFkPzVP3IqJYh6+bwlQCg/33m6QdpFCIc5LAJRSbS
Ewe+o+HGLeVGY7bxzX93a/YiU2NiSUfrsk6MDYHDFFKOn7xWmUiHAK3G7P38X1Cg
zxqgFl/wZ+pFH6Jt2wqOuQeY3RFvM3nkURmCGmWpPdmbxCHqPs9Dgc8pF6nCAvea
Mrjn2ao/eRoulKyPp05vwHdmtvRrx5kv2kNo2YL+eNt86i3vTt+BcCapnsqheqik
pj4+YsnrUPm5GL7zP/I4/RJs975SEqFEMonuoqyuYGHvQTthaoKbsZ7XUSfAiso=
=Ui8n
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to