[Announce] Maintenance release for GnuPG 1.2.x
    Werner Koch 
    wk at gnupg.org
       
    Thu Dec  7 17:07:12 CET 2006
    
    
  
Hello,
I am pleased to announce a security update to the 1.2 series of
GnuPG: Version 1.2.8.
The 1.2.x series has reached end of life status about 2 years ago.
However, I make an update available for the sake of those who can't
migrate to 1.4.  There is no guarantee that all problems are solved in
1.2 - it is in general better to migrate to the activly maintained 1.4
series.
You will find that version as well as corresponding signatures at the
usual place (ftp://ftp.gnupg.org/gcrypt/gnupg/).
Noteworthy changes in version 1.2.8 (2006-12-07)
------------------------------------------------
    Backported security fixes.  Note, that the 1.2.x series has
    reached end of life status.  You should migrate to 1.4.x.
    * Fixed a serious and exploitable bug in processing encrypted
      packages. [CVE-2006-6235].
    * Fixed a buffer overflow in gpg. [bug#728, CVE-2006-6169]
    * User IDs are now capped at 2048 bytes.  This avoids a memory
      allocation attack [CVE-2006-3082].
    * Added countermeasures against the Mister/Zuccherato CFB attack
      <http://eprint.iacr.org/2005/033>.
Happy Hacking,
   Werner
-- 
Werner Koch                                      <wk at gnupg.org>
The GnuPG Experts                                http://g10code.com
Join the Fellowship and protect your Freedom!    http://www.fsfe.org
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 196 bytes
Desc: not available
Url : /pipermail/attachments/20061207/2e2372f7/attachment.pgp 
    
    
More information about the Gnupg-announce
mailing list