Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

gnupg-utils-1.2.8-1tr RPM for i586

From Trustix 2.2 for i586

Name: gnupg-utils Distribution: Trustix Secure Linux
Version: 1.2.8 Vendor: Comodo Trustix
Release: 1tr Build date: Fri Mar 9 13:22:24 2007
Group: Trustix Official Build host: ttrmgtnived.comodo.net
Size: 20278 Source RPM: gnupg-1.2.8-1tr.src.rpm
Packager: Comodo Trustix <http://www.trustix.com>
Url: http://www.gnupg.org
Summary: some utilities to get gpg-keys
Helper utilities for gnuPG to get keys from a keyserver, either with
LDAP or by email.

Provides

Requires

License

GPL

Changelog

* Fri Mar 09 2007 Nived Gopalan <nived at trustix dot org> 1.2.8-1tr
  - New Upstream.
* Fri Dec 08 2006 Nived Gopalan <nived at trustix dot org> 1.2.6-6tr
  - SECURITY Fix: Tavis Ormandy has reported a vulnerability in GnuPG,
    caused due to an error within the decryption of malformed OpenPGP
    messages. This can be exploited to corrupt memory when decrypting
    a specially crafted OpenPGP message.
  
    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CVE-2006-6235 to this issue.
* Tue Nov 28 2006 Nived Gopalan <nived at trustix dot org> 1.2.6-5tr
  - SECURITY Fix: Fixed buffer overflow occurring in openfile.c if
    make_printable_string returns a longer string.
* Thu Aug 03 2006 Nived Gopalan <nived at trustix dot org> 1.2.6-4tr
  - SECURITY Fix: Evgeny Legerov has reported a vulnerability in GnuPG,
    caused due to an input validation error in parse_packet.c when
    handling certain message packets. This can be exploited to cause
    GnuPG to consume large amounts of memory or crash via an overly
    long comment length in a message packet. This can further be
    exploited to cause an integer overflow, which leads to possible
    memory corruption and crashes GnuPG.
  
    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CVE-2006-3746 to this issue.
* Thu Jul 13 2006 Nived Gopalan <nived at trustix dot org> 1.2.6-3tr
  - SECURITY Fix: A vulnerability has been reported in GnuPG, cause due
    to an input validation error within "parse-packet.c" when handling
    the length of a message packet. This can be exploited to cause gpg
    to consume large amount of memory or crash via an overly large packet
    length in a message packet. This can be further exploited to cause an
    integer overflow which leads to a possible memory corruption that
    crashes gpg.
  
    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CVE-2006-3082 to this issue.
* Fri Mar 17 2006 Nived Gopalan <nived at trustix dot org> 1.2.6-2tr
  - SECURITY Fix: Tavis Ormandy has reported a vulnerability in GnuPG,
    which can be exploited by malicious people to bypass certain security
    restrictions. The vulnerability is caused due to an error in the
    detection of unsigned data which makes it possible to inject arbitrary
    data into a signed message and affects the verification of non-detached
    signatures and signatures embedded in encrypted messages.
  - A verification weakness has been reported in gpgv where some input
    could lead to gpgv exiting with 0 even if the detached signature
    file did not carry any signature.
  
    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CVE-2006-0049 and CVE-2006-0455 to these issues.
* Thu Sep 23 2004 Syed Shabir <syedshabir at comodo dot com> 1.2.6-1tr
  - New upstream
* Tue Jan 27 2004 Erlend Midttun <erlendbm at trustix dot org> 1.2.4-1tr
  - New upstream.
* Wed Nov 26 2003 Erlend Midttun <erlendbm at trustix dot org> 1.2.3-1em
  - New upstream.
* Fri Oct 31 2003 Chr. Toldnes <christht at tawie dot org> 1.2.2-6tr
  - Backport (new gpg key)
* Sun Sep 28 2003 Chr. Toldnes <christht at tawie dot org> 1.2.2-5tsl
  - Port to tawie
* Mon Jun 23 2003 Erlend Midttun <erlendbm at trustix dot com> 1.2.2-4tr
  - Added %defattr.
* Wed Jun 18 2003 Erlend Midttun <erlendbm at trustix dot com> 1.2.2-3tr
  - Big rebuild
* Mon Jun 02 2003 Erlend Midttun <erlendbm at trustix dot com> 1.2.2-2em
  - Fixed filelist.
* Wed May 28 2003 Erlend Midttun <erlendbm at trustix dot com> 1.2.2-1em
  - New upstream.
* Mon Mar 24 2003 Erlend Midttun <erlendbm at trustix dot com> 1.2.1-4em
  - Rebuilt against glibc 2.3.2.
* Mon Mar 24 2003 Goetz Bock <bock at trustix dot org> 1.2.1-3bg
  - removed locals
  - splitted additional key-fetchers into own package
  - little specfile cleanups
* Tue Mar 11 2003 Erlend Midttun <erlendbm at trustix dot com> 1.2.1-2em
  - Cleaned up %doc
* Tue Feb 25 2003 Erlend Midttun <erlendbm at trustix dot com> 1.2.1-1em
  - New upstream version.
* Mon Jun 03 2002 Erlend Midttun <erlendbm at trustix dot com>
  - New upstream version.
* Fri Mar 01 2002 Christian H. Toldnes <christht at trustix dot com>
  - gpg-trustix-sign update.
  - Package cleanup.
* Tue Jun 05 2001 Erlend Midttun <erlendbm at trustix dot com>
  - As pointed out by Bruno Postle, RSA is now supported.
* Thu May 31 2001 Erlend Midttun <erlendbm at trustix dot com>
  - Upgraded to 1.0.6 to fix format string bug.
* Wed Dec 20 2000 Oystein Viggen <oysteivi at trustix dot com>
  - Import two patches from RH to fix bugs with importing private keys and
    checking detached signatures.
* Fri Oct 27 2000 Erlend Midttun <erlendbm at trustix dot com>
  - Some mv error in spec file breaking upgrade.
* Wed Oct 18 2000 Erlend Midttun <erlendbm at trustix dot com>
  - Picked up 1.0.4 which fixes a bug with regards to serveral signatures
    in the same file.  Bugtraq.
* Fri Sep 15 2000 Per Ivar Paulsen <perp at trustix dot com>
  - Picked up 1.02
* Fri Jun 16 2000 Oystein Viggen <oysteivi at trustix dot com>
  - fix a slight bug in adding the public key to the chain
  - hack around bogosity with roots homedir being / during install
* Wed May 03 2000 Lars Gaarden <larsg at trustix dot com>
  - added the Trustix public signature key
* Sat May 29 1999 Fabio Coatti <cova@ferrara.linux.it>
  - Some corrections in French description, thanks to 
    Gaël Quéri <gqueri@mail.dotcom.fr>
* Mon May 17 1999 Fabio Coatti <cova@felix.unife.it>
  - Added French description, provided by 
    Christophe Labouisse <labouiss@cybercable.fr>
* Thu May 06 1999 Fabio Coatti <cova@felix.unife.it> 
  - Upgraded for 0.9.6 (removed gpgm)
* Tue Jan 12 1999 Fabio Coatti <cova@felix.unife.it>
  - LINGUAS variable is now unset in configure to ensure that all
    languages will be built. (Thanks to Luca Olivetti <luca@luca.ddns.org>)
* Sat Jan 02 1999 Fabio Coatti <cova@felix.unife.it>
  - Added pl language file.
  - Included g10/pubring.asc in documentation files.
* Sat Dec 19 1998 Fabio Coatti <cova@felix.unife.it>
  - Modified the spec file provided by Caskey L. Dickson 
    <caskey-at-technocage.com>
  - Now it can be built also by non-root. Installation has to be done as
    root, gpg is suid.
  - Added some changes by  Ross Golder <rossigee@bigfoot.com>
  - Updates for version 0.4.5 of GnuPG (.mo files)

Files

/usr/lib/gnupg/gpgkeys_ldap
/usr/lib/gnupg/gpgkeys_mailto


Generated by rpm2html 1.8.1

Fabrice Bellet, Thu Apr 10 13:04:48 2014