#Libgcrypt 1.11.1 has been released (#GnuPG / #GPG / #PGP / #GNUPrivacyGuard / #PrettyGoodPrivacy) https://gnupg.org/
#Libgcrypt 1.11.1 has been released (#GnuPG / #GPG / #PGP / #GNUPrivacyGuard / #PrettyGoodPrivacy) https://gnupg.org/
Can anyone pIs point me into a direction or actually has a solution to install #libbdplus on #endeavouros / #archlinux without getting error of missing #libgcrypt-config?
See: https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1972760.html
@linux
Hi,
the new stable version of #libgcrypt comes with #PQC algorithms and lots of other featuresand imporvements. This release will be required for the forthcoming #GnuPG 2.5
See
https://lists.gnupg.org/pipermail/gnupg-announce/2024q2/000483.html
@GnuPG @todd_a_jacobs@infosec.exchange @letsencrypt I pay for well-written #FOSS software on #iOS all the time. There's nothing that I know of that would prevent #GnuPG itself or their commercial relatives from releasing an #iOS version based on #libgcrypt, other than the scarcity of developer resources of course.
There's definitely a gap in the #OpenPGP ecosystem for trustworthy iOS and #iPadOS apps. Might be something to consider for the future to fund continued development of GnuPG!
@GnuPG @todd_a_jacobs@infosec.exchange @todd_a_jacobs @letsencrypt AFAICT, the App Store version is 2021.4, and there have been a lot of CVEs and improvements in #GPG since then. I'm reluctant to rely on outdated software, esp. if its #libgcrypt or #ObjectivePGP haven't been updated since 2021 by the developer (listed as Luca Naef).
I'm not an Apple or #Swift developer. The code is GPLv3, so it could be forked if unmaintained.
RT @gnupg@twitter.com
Please do not use 1.9.0 but use the just released 1.9.1. There is a severe bug in 1.9.0 which was found yesterday. 1.8 versions are safe. Details will follow today. (#gnupg, #libgcrypt, #cve).
Опасная уязвимость в Libgcrypt затрагивает многие дистрибутивы Linux #уязвимость, #библиотека, #шифрование, #Libgcrypt, #GnuPG, #OpenPGP, #Linux https://t.co/AKcBC6yR5q https://t.co/hugJDa3caZ
Источник: https://twitter.com/SecurityLabnews/status/1356505153248108544
#Libgcrypt developers release urgent update to tackle severe #vulnerability. A severe heap buffer issue was found by Google Project Zero’s Tavis Ormandy.
https://www.zdnet.com/article/libgcrypt-developers-release-urgent-update-to-tackle-severe-vulnerability/#ftag=RSSbaffb68
#encryption #vulnerabilities
[Announce] [Security fix] Libgcrypt 1.9.1 relased - https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000456.html
We have to announce the availability of #Libgcrypt version 1.9.1.This version fixes a *critical security bug* in the recently released version 1.9.0. If you are already using 1.9.0 please update immediately to 1.9.1.
2145 - gpg: heap buffer overflow in libgcrypt - project-zero - https://bugs.chromium.org/p/project-zero/issues/detail?id=2145
There is a heap buffer overflow in #libgcrypt due to an incorrect assumption in the block buffer management code. Just decrypting some data can overflow a heap buffer with attacker controlled data, no verification or signature is validated before the vulnerability occurs.
#Libgcrypt 1.9.0, the newest version of a cryptographic library integrated in the #GNU Privacy Guard ( #GnuPG) free #encryption software, has a “severe” #security #vulnerability and should not be used, warned Werner Koch.
https://www.helpnetsecurity.com/2021/01/29/libgcrypt-vulnerability/?&web_view=true
#freesoftware #opensource
#libgcrypt v1.9.1 fixes a buffer overflow, here are the details https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000456.html https://dev.gnupg.org/T5275 #GnuPG
#libgcrypt v1.9.1 is already available from the download servers https://gnupg.org/download/index.html the announcement is being worked on.
To #GnuPG developers (and other crypto devs using libgcrypt): There is going to be a new #Libgcrypt library release today, fixing a severe defect in Libgcrypt 1.9.0 that was released last week. Do not use 1.9.0. https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000455.html
researcher cracked 1024-bit RSA encryption in #GnuPG Crypto Libary.
http://thehackernews.com/2017/07/gnupg-libgcrypt-rsa-encryption.html