Commit Graph

12 Commits

Author SHA1 Message Date
pvalchev
db891178f7 correct asm-syntax for powerpc. pointed by drahn, ok markus 2001-08-09 16:48:35 +00:00
reinhard
9879992112 update to gnupg-1.0.6; SECURITY FIX
*) Fixed a format string bug which is exploitable if --batch is not used.
*) Checked all translations for format strings bugs.
*) Removed the Russian translation due to too many bugs.
*) Fixed keyserver access and expire time calculation.

ok maintainer
2001-06-05 09:19:05 +00:00
jakob
436c5ffef5 update to v1.0.5. ok markus@. 2001-05-23 15:28:49 +00:00
reinhard
36bdf033ff SECURITY UPDATE (Klima-Rosa attack)
patch from:
Florian Weimer <Florian.Weimer@RUS.UNI-STUTTGART.DE>
# http://cert.uni-stuttgart.de/files/fw/gnupg-klima-rosa.diff
# http://cert.uni-stuttgart.de/files/fw/gnupg-klima-rosa.diff.asc

It introduces additional consistency checks, as suggested by the
authors of the paper.  The checks are slightly different, but they
make the two additional attacks infeasible, I think.  In the future,
it might be a good idea to add a check the generated signature for
validity, this will detect bugs in the MPI implementation which could
result in a revealed secret key, too.


ok markus@
2001-03-23 13:10:20 +00:00
reinhard
f4aa1ff9a5 o) minor fix for one of the MASTER_SITES; Pete Fritchman <petef@databits.net>
o) use /dev/arandom; suggested by markus@
o) add idea FLAVOR; suggested by markus@
o) add another MASTER_SITE
o) bump NEED_VERSION
2001-03-03 17:17:28 +00:00
reinhard
5e2899097a Security update, from the original patch:
It has been pointed out that there is another bug in the signature
verification code of GnuPG.

         * This can easily lead to false positives *

All versions of GnuPG released before today are vulnerable!

To check a detached singature you normally do this:

  gpg --verify foo.sig foo.txt

The problem here is that someone may replace foo.sig with a standard
signature containing some arbitrary signed text and its signature,
and then modify foo.txt - GnuPG does not detect this - Ooops.

The solution for this problem ist not easy and needs a change in the
semantics of the --verify command: It will not any longer be
possible to do this:

  gpg --verify foo.sig <foo.txt

Instead you have to use this

  gpg --verify foo.sig - <foo.txt

The difference here is that gpg sees 2 files on the command lines
and thereby knows that it should check a detached signature.  We
really need this information and there is no way to avoid that
change, sorry.  You should make sure that you never use the first
form, because this will lead to false positives when foo.sig is not
a detached signature - gnupg does detect the other case and warns
you, but this is not sufficient.  If you use GnuPG from other
applications, please change it.

ok markus@
2000-12-23 15:20:59 +00:00
markus
07aae00303 security update, since 1.0.3 does not detect modifications of files with multiple signatures 2000-10-30 12:52:32 +00:00
brad
37e77d5814 upgrade to gnupg 0.9.10 1999-08-04 22:41:02 +00:00
brad
040cb584ca upgrade to GNUPG 0.9.9; -
Markus Friedl <markus.friedl@informatik.uni-erlangen.de>
1999-07-25 23:33:41 +00:00
brad
001ae99fd7 upgrade to GnuPG 0.9.7 1999-05-24 20:55:44 +00:00
brad
8b5d32c736 upgrade to GnuPG 0.9.6 1999-05-08 17:38:40 +00:00
brad
4a7daafbb4 add gnupg port; markus.friedl@informatik.uni-erlangen.de
-
GNU privacy guard - a free PGP replacement.
1999-04-23 03:16:05 +00:00