Your message dated Thu, 01 Aug 2013 19:17:06 +0000
with message-id <e1v4yn0-0003pf...@franck.debian.org>
and subject line Bug#717880: fixed in gnupg 1.4.12-7+deb7u1
has caused the Debian Bug report #717880,
regarding gnupg: CVE-2013-4242: Yarom/Falkner flush+reload side-channel attack 
on RSA secret keys
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
717880: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: gnupg
Version: 1.4.12-7
Severity: critical
Tags: security
Justification: root security hole


Hi.

There is a fix available upstream for the Yarom/Falkner flush+reload
side-channel attack.

See this announcement:
http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html


Cheers,
Chris.

--- End Message ---
--- Begin Message ---
Source: gnupg
Source-Version: 1.4.12-7+deb7u1

We believe that the bug you reported is fixed in the latest version of
gnupg, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 717...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thijs Kinkhorst <th...@debian.org> (supplier of updated gnupg package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sun, 28 Jul 2013 12:58:25 +0200
Source: gnupg
Binary: gnupg gnupg-curl gpgv gnupg-udeb gpgv-udeb gpgv-win32
Architecture: source all amd64
Version: 1.4.12-7+deb7u1
Distribution: wheezy-security
Urgency: high
Maintainer: Debian GnuPG-Maintainers <pkg-gnupg-ma...@lists.alioth.debian.org>
Changed-By: Thijs Kinkhorst <th...@debian.org>
Description: 
 gnupg      - GNU privacy guard - a free PGP replacement
 gnupg-curl - GNU privacy guard - a free PGP replacement (cURL)
 gnupg-udeb - GNU privacy guard - a free PGP replacement (udeb)
 gpgv       - GNU privacy guard - signature verification tool
 gpgv-udeb  - minimal signature verification tool (udeb)
 gpgv-win32 - GNU privacy guard - signature verification tool (win32 build)
Closes: 717880
Changes: 
 gnupg (1.4.12-7+deb7u1) wheezy-security; urgency=high
 .
   * Apply upstream patch to fix side channel attack on RSA
     (CVE-2013-4242, closes: #717880).
Checksums-Sha1: 
 7b51463f6c49c9a98c683bea1e60482f6641ae24 1990 gnupg_1.4.12-7+deb7u1.dsc
 790587e440ec7d429b120db7a96a237badc638fd 4939171 gnupg_1.4.12.orig.tar.gz
 e984643f4a06c2b0229d99c6d052d18f47b92b03 94139 
gnupg_1.4.12-7+deb7u1.debian.tar.gz
 7c9f20c17074af87334fb22110f1d34c230422d4 613232 
gpgv-win32_1.4.12-7+deb7u1_all.deb
 52bb3dceec518056be08ebe13c9d8d0ac29c28b3 1952292 
gnupg_1.4.12-7+deb7u1_amd64.deb
 95325f35bb1628e4360667c07e34d7883055e3d4 63774 
gnupg-curl_1.4.12-7+deb7u1_amd64.deb
 28f8b0426d5d73a59c7d8e11cda8f8440512cc30 226100 gpgv_1.4.12-7+deb7u1_amd64.deb
 9c1d414d77582938af4023762faf2c0379281266 352530 
gnupg-udeb_1.4.12-7+deb7u1_amd64.udeb
 60d61e6e382372a19384b65837cea378b261d41e 129480 
gpgv-udeb_1.4.12-7+deb7u1_amd64.udeb
Checksums-Sha256: 
 81a6e8b56f8143816c27040fc3577dacc57a9128bf28b085efa1b35e77161e16 1990 
gnupg_1.4.12-7+deb7u1.dsc
 bb94222fa263e55a5096fdc1c6cd60e9992602ce5067bc453a4ada77bb31e367 4939171 
gnupg_1.4.12.orig.tar.gz
 77aa404dee7bb33bcbfda76cf304d0474283b8707cf0727eae3726e174bf5279 94139 
gnupg_1.4.12-7+deb7u1.debian.tar.gz
 11d5f1388e99b7ba54628c3d416f707a7a2f0348ee939abf26510b1914f6c577 613232 
gpgv-win32_1.4.12-7+deb7u1_all.deb
 56b8385bccc94c0346bfbfa08d406a326dac371b328753209f3b1206e88d8fb0 1952292 
gnupg_1.4.12-7+deb7u1_amd64.deb
 0e5272fd1e63c3d55b536dc54a3a498a73aa9ca999360882dd4df3bcec12d5a1 63774 
gnupg-curl_1.4.12-7+deb7u1_amd64.deb
 82f60f8e336c214e975c3e54d57bca975a60f7eaec3c814171a594879b4d0db1 226100 
gpgv_1.4.12-7+deb7u1_amd64.deb
 7f85c4227ac7c38638befab4c4cfbc4a28e604d8ad2d2f15c8b9a81f9b0fdf24 352530 
gnupg-udeb_1.4.12-7+deb7u1_amd64.udeb
 3ddbdc568116c56dbb33e940b2dcaf0fa740ccfceb7ee999e9bc61e1a200f4e4 129480 
gpgv-udeb_1.4.12-7+deb7u1_amd64.udeb
Files: 
 fb8c1531191a17bd355eecadbf946b0a 1990 utils important gnupg_1.4.12-7+deb7u1.dsc
 f9a65ccd7166d3fdb084454cf7427564 4939171 utils important 
gnupg_1.4.12.orig.tar.gz
 c7dcc8db6ba4e59582bcc6217b5bae6f 94139 utils important 
gnupg_1.4.12-7+deb7u1.debian.tar.gz
 4cc1e3eba81e93ed372661e61add0e5a 613232 utils extra 
gpgv-win32_1.4.12-7+deb7u1_all.deb
 3858967d081b9d1c86700e1f820c7f23 1952292 utils important 
gnupg_1.4.12-7+deb7u1_amd64.deb
 1d19eeef7f997b87053c133973d07575 63774 utils optional 
gnupg-curl_1.4.12-7+deb7u1_amd64.deb
 8dfa7560c673d3d7144bd00791669743 226100 utils important 
gpgv_1.4.12-7+deb7u1_amd64.deb
 c07dc2f6ec1aa3a0018e6512027060b9 352530 debian-installer extra 
gnupg-udeb_1.4.12-7+deb7u1_amd64.udeb
 ac8f621221e76ae73972ce09ec36583c 129480 debian-installer extra 
gpgv-udeb_1.4.12-7+deb7u1_amd64.udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJR9QbGAAoJEFb2GnlAHawEYEMH/RUhQkCDpzYaiUJOvBw5pswb
NRKYBJ12kNSBaWEy66COM87yUaUdTZ82NMDshP/WiCebRnEg5j1/gieRNZI1CUTg
B3+/cQYckyAQktUPkdxwELGsnFab0Ma5mneXgGNjSXimQCuuGutQNKKdkKrxrtqb
iD/QVvY7jPsjsJ2WG7NJBl2Bo/kG2no+v5TnSatToM3L3Ltld4SSU9pwSlcCxqzO
SVEuy38vrA5F41zvV70b4gMX+TX1vRPiBSTTgxSBCyScMq0jMgNm3HL84GIktojp
Sv30MqLaSZSJSzNfsZYcswTJ5GfSYV1+nu0qQgYFH6Yl5MKtkS30lGBtL61C/R8=
=Gtwy
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to