gnupg

Description:The GNU Privacy Guard, a GPL OpenPGP implementation
License: GPL-3+
Homepage:https://gnupg.org/
Location:Portage
Legend:
  • + - stable
  • ~ - unstable
  • M - hardmask
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
2.4.3 diff ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ - ~ ~
2.4.2-r1 diff ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ - ~ ~
2.2.41 ~ + + + ~ ~ ~ + + ~ - + +

USE flags

  • bzip2 - Use the bzlib compression library
  • doc - Add extra documentation (API, Javadoc, etc). It is recommended to enable per package instead of globally
  • ldap - Add LDAP support (Lightweight Directory Access Protocol)
  • nls - Add Native Language Support (using gettext - GNU locale utilities)
  • readline - Enable support for libreadline, a GNU line-editing library that almost everyone wants
  • selinux - !!internal use only!! Security Enhanced Linux support, this must be set by the selinux profile or breakage will occur
  • smartcard - Build scdaemon software. Enables usage of OpenPGP cards. For other type of smartcards, try app-crypt/gnupg-pkcs11-scd. Bring in dev-libs/libusb as a dependency; enable scdaemon.
  • ssl - Add support for SSL/TLS connections (Secure Socket Layer / Transport Layer Security)
  • test - Enable dependencies and/or preparations necessary to run tests (usually controlled by FEATURES=test but can be toggled independently)
  • tofu - Enable support for Trust on First use trust model; requires dev-db/sqlite.
  • tools - Install extra tools (including gpgsplit and gpg-zip).
  • tpm - Enable TPM support via app-crypt/tpm2-tss and build tpm2d.
  • usb - Build direct CCID access for scdaemon; requires dev-libs/libusb.
  • user-socket - try a socket directory which is not removed by init manager at session end
  • verify-sig - Verify upstream signatures on distfiles
  • wks-server - Install the wks-server

Security Advisory

Date Severity Title
about 8 years normal GnuPG: RNG output is predictable
over 8 years normal GnuPG: Multiple vulnerabilities
over 10 years normal GnuPG: Denial of Service
almost 11 years normal GnuPG, Libgcrypt: Multiple vulnerabilities
about 13 years normal GnuPG: User-assisted execution of arbitrary code
about 18 years normal GnuPG: Multiple vulnerabilities
over 18 years high GnuPG: Integer overflow vulnerability
almost 19 years normal GnuPG: Incorrect signature verification
almost 19 years normal GnuPG: Incorrect signature verification
almost 20 years low GnuPG: OpenPGP protocol attack
about 21 years translation missing: en, label_glsa_minimal GnuPG: ElGamal signing keys compromised and format string vulnerability

Also available in: Atom

Thank you!