Werner Koch wrote on 12/18/13, 4:05 PM: > Hello! > > Along with the publication of an interesting new side channel attack by > Daniel Genkin, Adi Shamir, and Eran Tromer we announce the availability > of a new stable GnuPG release to relieve this bug: Version 1.4.16. > > This is a *security fix* release and all users of GnuPG versions 1.x are > advised to updated to this version. GnuPG versions 2.x are not > affected. See below for the impact of the problem.
[...] Hi, compiled from source: Version info: gnupg 1.4.16 Configured for: Darwin (x86_64-apple-darwin13.0.0) gpg (GnuPG) 1.4.16 Copyright (C) 2013 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Home: ~/.gnupg Supported algorithms: Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH, CAMELLIA128, CAMELLIA192, CAMELLIA256 Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224 Compression: Uncompressed, ZIP, ZLIB, BZIP2 Thank you for your work. Charly 0x15E4F2EA Mac OS X 10.9.1 (13B42) MacBook Intel C2Duo 2GHz 13-inch, Aluminum, Late 2008 . (GnuPG/MacGPG2) 2.0.22 - gpg (GnuPG) 1.4.16 TB 24.2.0 Enigmail version 1.6 (20131006-1849) _______________________________________________ Gnupg-users mailing list [email protected] http://lists.gnupg.org/mailman/listinfo/gnupg-users
