[Announce] Maintenance release for GnuPG 1.2.x

Werner Koch wk at gnupg.org
Thu Dec 7 17:07:12 CET 2006


Hello,

I am pleased to announce a security update to the 1.2 series of
GnuPG: Version 1.2.8.

The 1.2.x series has reached end of life status about 2 years ago.
However, I make an update available for the sake of those who can't
migrate to 1.4.  There is no guarantee that all problems are solved in
1.2 - it is in general better to migrate to the activly maintained 1.4
series.

You will find that version as well as corresponding signatures at the
usual place (ftp://ftp.gnupg.org/gcrypt/gnupg/).



Noteworthy changes in version 1.2.8 (2006-12-07)
------------------------------------------------

    Backported security fixes.  Note, that the 1.2.x series has
    reached end of life status.  You should migrate to 1.4.x.

    * Fixed a serious and exploitable bug in processing encrypted
      packages. [CVE-2006-6235].

    * Fixed a buffer overflow in gpg. [bug#728, CVE-2006-6169]

    * User IDs are now capped at 2048 bytes.  This avoids a memory
      allocation attack [CVE-2006-3082].

    * Added countermeasures against the Mister/Zuccherato CFB attack
      <http://eprint.iacr.org/2005/033>.



Happy Hacking,

   Werner


-- 
Werner Koch                                      <wk at gnupg.org>
The GnuPG Experts                                http://g10code.com
Join the Fellowship and protect your Freedom!    http://www.fsfe.org
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 196 bytes
Desc: not available
Url : /pipermail/attachments/20061207/2e2372f7/attachment.pgp 
-------------- next part --------------
_______________________________________________
Gnupg-announce mailing list
Gnupg-announce at gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-announce


More information about the Gnupg-users mailing list