2.x (was: [Announce] [security fix] GnuPG 1.4.16 released)

2013-12-21 Thread Uwe Brauer
Werner == Werner Koch w...@gnupg.org writes: Hello! Along with the publication of an interesting new side channel attack by Daniel Genkin, Adi Shamir, and Eran Tromer we announce the availability of a new stable GnuPG release to relieve this bug: Version 1.4.16. This is a

[Announce] [security fix] GnuPG 1.4.16 released

2013-12-18 Thread Werner Koch
Hello! Along with the publication of an interesting new side channel attack by Daniel Genkin, Adi Shamir, and Eran Tromer we announce the availability of a new stable GnuPG release to relieve this bug: Version 1.4.16. This is a *security fix* release and all users of GnuPG versions 1.x are

Re: [Announce] [security fix] GnuPG 1.4.16 released // workaround

2013-12-18 Thread vedaal
On Wednesday, December 18, 2013 at 9:25 AM, Werner Koch w...@gnupg.org wrote: The paper describes two attacks. The first attack allows to distinguish keys: An attacker is able to notice which key is currently used for decryption. ... While listening to the acoustic emanations of the

Re: [Announce] [security fix] GnuPG 1.4.16 released

2013-12-18 Thread Charly Avital
Werner Koch wrote on 12/18/13, 4:05 PM: Hello! Along with the publication of an interesting new side channel attack by Daniel Genkin, Adi Shamir, and Eran Tromer we announce the availability of a new stable GnuPG release to relieve this bug: Version 1.4.16. This is a *security fix*