SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for gpg1-1.4.12-1.1.i586.rpm :
Mon Feb 27 13:00:00 2012 bugsAATTsingvogel.com
- upgrade to version 1.4.12:

* Disabled ppc64 patch, might be already addressed in Makefile

* Removed entcrypt-to patch, already in upstream default conf file

* fixed patches for new version

* added new (doc) files in spec file

Wed Dec 17 13:00:00 2008 kssingvoAATTsuse.de
- workaround in specfile for compiler issues in openSUSE-11.1

Wed Mar 26 13:00:00 2008 kssingvoAATTsuse.de
- upgrade to version 1.4.9:

* Fixed possible memory corruption bug in 1.4.8 while importing
OpenPGP keys.

* Improved AES encryption performance by more than 20% (on ia32).
Decryption is also a bit faster.
- fixed use-agent patch
- removed references to SUSE 8.x versions in specfile
- cleaned up specfile

Mon Jan 7 13:00:00 2008 kssingvoAATTsuse.de
- upgrade to version 1.4.8

* Changed the license to GPLv3.

* Improved detection of keyrings specified multiple times.

* Changes to better cope with broken keyservers.

* Minor bug fixes.

* The GnuPG --openpgp mode has been updated to match the new RFC-4880
standard.

* By default --require-cross-certification is now on. --rfc2440-text
and --force-v3-sigs are now off.

* Allow encryption using legacy Elgamal sign+encrypt keys if option
option --rfc2440 is used.

* Fixed the auto creation of the key stub for smartcards.

* Fixed a rare bug in decryption using the OpenPGP card.

* Fix RFC-4880 typo in the SHA-224 hash prefix. Old SHA-224
signatures will continue to work.

Thu Nov 29 13:00:00 2007 kssingvoAATTsuse.de
- upgrade to version 1.4.7
- removed duplicate overflow fixes
- renamed package from \"gpg\" to \"gpg1\"
- adaption in files_are_digest patch

Wed Mar 14 13:00:00 2007 kssingvoAATTsuse.de
- fixed issue in improper status handling CVE-2007-1263 (bugzilla#251605)

Thu Dec 7 13:00:00 2006 kssingvoAATTsuse.de
- fixed security issue in dfx stack handling CVE-2006-6235 (bugzilla#225694)

Tue Nov 28 13:00:00 2006 kssingvoAATTsuse.de
- fixed security issue with openfile in interactive mode (bugzilla#224108)

Wed Aug 2 14:00:00 2006 kssingvoAATTsuse.de
- update to version 1.4.5:

* Reverted check for valid standard handles under Windows.

* More DSA2 tweaks.

* Fixed a problem uploading certain keys to the smart card.

* Fixed 2 more possible memory allocation attacks. They are
similar to the problem we fixed with 1.4.4. This bug can easily
be be exploted for a DoS; remote code execution is not entirely
impossible.

* Added Norwegian translation.
- added patch to sign signatures stored in files

Mon Jun 26 14:00:00 2006 kssingvoAATTsuse.de
- upgrade to 1.4.4 (mainly bugfix version)
- removed already present (security) bugfixes
- adapted SUSE specialized patches
- removed s-bit as we have user mlock in kernel now (bugzilla#137562)


 
ICM