ELSA-2013-1457

ELSA-2013-1457 - libgcrypt security update

Type:SECURITY
Severity:MODERATE
Release Date:2013-10-24

Description


[1.4.5-11]
- fix CVE-2013-4242 GnuPG/libgcrypt susceptible to cache side-channel attack

[1.4.5-10]
- Add GCRYCTL_SET_ENFORCED_FIPS_FLAG command


Related CVEs


CVE-2013-4242

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (i386) libgcrypt-1.4.4-7.el5_10.src.rpmf2bcdd366f7d40e75cda27ae041c224e-
libgcrypt-1.4.4-7.el5_10.i386.rpm3bfc40c7901f0b191d95fdce14df9823-
libgcrypt-devel-1.4.4-7.el5_10.i386.rpmcdcbbe9197fa91b9028442e422f874c0-
Oracle Linux 5 (ia64) libgcrypt-1.4.4-7.el5_10.src.rpmf2bcdd366f7d40e75cda27ae041c224e-
libgcrypt-1.4.4-7.el5_10.i386.rpm3bfc40c7901f0b191d95fdce14df9823-
libgcrypt-1.4.4-7.el5_10.ia64.rpm7d6a25db7f44be7597537be9cbef523b-
libgcrypt-devel-1.4.4-7.el5_10.ia64.rpm106307026b67ee34180aa4cf3fcae985-
Oracle Linux 5 (x86_64) libgcrypt-1.4.4-7.el5_10.src.rpmf2bcdd366f7d40e75cda27ae041c224e-
libgcrypt-1.4.4-7.el5_10.i386.rpm3bfc40c7901f0b191d95fdce14df9823-
libgcrypt-1.4.4-7.el5_10.x86_64.rpmf1082a1b703af5b3306623a178c53406-
libgcrypt-devel-1.4.4-7.el5_10.i386.rpmcdcbbe9197fa91b9028442e422f874c0-
libgcrypt-devel-1.4.4-7.el5_10.x86_64.rpm04f501a69998c22ddbee3fb27536ea1c-
Oracle Linux 6 (i386) libgcrypt-1.4.5-11.el6_4.src.rpm81eaf3d5bf027ae33e3505b4676d46a7ELSA-2016-2674
libgcrypt-1.4.5-11.el6_4.i686.rpm3db746e6e0a0dd96c41692898d75a1eeELSA-2016-2674
libgcrypt-devel-1.4.5-11.el6_4.i686.rpm9cf8f413ef061d5f166f42a010121af7ELSA-2016-2674
Oracle Linux 6 (x86_64) libgcrypt-1.4.5-11.el6_4.src.rpm81eaf3d5bf027ae33e3505b4676d46a7ELSA-2016-2674
libgcrypt-1.4.5-11.el6_4.i686.rpm3db746e6e0a0dd96c41692898d75a1eeELSA-2016-2674
libgcrypt-1.4.5-11.el6_4.x86_64.rpm8f9abdb77cdbdd221252809fb2b26f35ELSA-2016-2674
libgcrypt-devel-1.4.5-11.el6_4.i686.rpm9cf8f413ef061d5f166f42a010121af7ELSA-2016-2674
libgcrypt-devel-1.4.5-11.el6_4.x86_64.rpm89703c8becf8b1ca68b3e6d3d1be7913ELSA-2016-2674



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete