Is this version safe from the security bug below?
Security fixes for Libgcrypt and GnuPG 1.4 (2016-08-17) important
A bug in the random number generator of Libgcrypt and in GnuPG 1.4 has been found. Updating the software is highly suggested. Please read this mail for details. Note that the CVE id in that mail is not correct, the correct one is CVE-2016-6313.
Not to have this bug
Mac OS X 10.12 (16A323) Libmacgpg 0.7 769 GPGMail - GPG Keychain 1.3.1 1233 GPGServices 1.11 907 MacGPG2 2.0.30 875 GPGPreferences 2.0 887 Pinentry 0.9.7 2
- 2016-09-21_20-07_DebugInfo.gpg 16.1 KB
Comments are currently closed for this discussion. You can start a new one.
|?||Show this help|
|ESC||Blurs the current field|
|r||Focus the comment reply box|
|^ + ↩||Submit the comment|
You can use
Command ⌘ instead of
Control ^ on Mac
Support Staff 1 Posted by Steve on 12 Oct, 2016 05:56 PM
the fix is already in the nightly build: https://releases.gpgtools.org/nightlies/ and will be included in the next stable release.
Support Staff 2 Posted by Steve on 12 Dec, 2016 05:28 PM
GPG Suite 2016.10 has been released 2016-10-14.
Steve closed this discussion on 12 Dec, 2016 05:28 PM.