Fedora 20: gnupg2 Security Update

    Date22 Apr 2015
    CategoryFedora
    95
    Posted ByLinuxSecurity Advisories
    Updated package from upstream fixing minor security issues.
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2015-5969
    2015-04-11 04:33:19
    --------------------------------------------------------------------------------
    
    Name        : gnupg2
    Product     : Fedora 20
    Version     : 2.0.27
    Release     : 1.fc20
    URL         : http://www.gnupg.org/
    Summary     : Utility for secure communication and data storage
    Description :
    GnuPG is GNU's tool for secure communication and data storage.  It can
    be used to encrypt data and to create digital signatures.  It includes
    an advanced key management facility and is compliant with the proposed
    OpenPGP Internet standard as described in RFC2440 and the S/MIME
    standard as described by several RFCs.
    
    GnuPG 2.0 is a newer version of GnuPG with additional support for
    S/MIME.  It has a different design philosophy that splits
    functionality up into several modules. The S/MIME and smartcard functionality
    is provided by the gnupg2-smime package.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    Updated package from upstream fixing minor security issues.
    
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Fri Apr 10 2015 Tomáš Mráz  - 2.0.27-1
    - new upstream release fixing minor security issues
    * Sat Aug 16 2014 Fedora Release Engineering  - 2.0.25-2
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
    * Tue Aug  5 2014 Tomáš Mráz  - 2.0.25-1
    - new upstream release fixing a minor regression introduced by the previous one
    - add --file-is-digest option needed for copr
    * Sat Jul 12 2014 Tom Callaway  - 2.0.24-2
    - fix license handling
    * Wed Jun 25 2014 Tomáš Mráz  - 2.0.24-1
    - new upstream release fixing CVE-2014-4617
    * Sat Jun  7 2014 Fedora Release Engineering  - 2.0.22-4
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
    * Wed May  7 2014 Tomáš Mráz  - 2.0.22-3
    - do not dump core if hash algorithm not available in the FIPS mode
    * Tue Mar  4 2014 Tomáš Mráz  - 2.0.22-2
    - rebuilt against new libgcrypt
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1178759 - gnupg2: double free in cmd_readkey()
            https://bugzilla.redhat.com/show_bug.cgi?id=1178759
    --------------------------------------------------------------------------------
    
    This update can be installed with the "yum" update program.  Use
    su -c 'yum update gnupg2' at the command line.
    For more information, refer to "Managing Software with yum",
    available at http://docs.fedoraproject.org/yum/.
    
    All packages are signed with the Fedora Project GPG key.  More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://admin.fedoraproject.org/mailman/listinfo/package-announce
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"4","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":14.29,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.