Updated gnupg2 packages that fix several bugs are now available for Red HatEnterprise Linux 6.

The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data andcreating digital signatures, compliant with the proposed OpenPGP Internetstandard and the S/MIME standard.This update fixes the following bugs:* Previously, the secret key management daemon for GnuPG, gpg-agent, failed toencode a new iteration count value when it created a new protected key orchanged an existing key. As a consequence, the key could not be unprotected andgpg-agent thus did not properly interact with a number of programs that use keydecryption, such as KMail or Kleopatra. With this update, the new iterationcount is encoded properly and the decryption of keys created or modified bygpg-agent no longer fails. (BZ#638635)* Prior to this update, the GnuPG encryption and signing tool, gpg2, by defaultused CAST5, an encryption algorithm not approved by FIPS standards.Consequently, when gpg2 was run in FIPS mode, data encryption and decryptionfailed and caused gpg2 to terminate unexpectedly. With this update, GnuPG usesAES, a FIPS-approved encryption algorithm, and gpg2 data encryption anddecryption in FIPS mode work as intended. (BZ#966493)* Previously, the GnuPG signature checking tool, gpgv2, did not correctlyinteract with the Libgcrypt library. As a consequence, when the gpgv command wasused on a file, gpgv2 terminated unexpectedly. This update fixes the error andthe gpgv command now functions correctly. (BZ#1006879)* Prior to this update, GnuPG did not check for availability of the RIPEMD-160hash function digest. Because the RIPEMD-160 algorithm is not approved by FIPSstandards, GnuPG therefore terminated unexpectedly when the “gpg –verify”command was used in FIPS mode to verify a signature that contained a RIPEMD-160hash. With this update, GnuPG properly checks for RIPEMD-160 support and thecrash no longer occurs. (BZ#1078957)Users of gnupg2 are advised to upgrade to these updated packages, which fixthese bugs.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Desktop FasTrack (v. 6)

SRPMS:
gnupg2-2.0.14-8.el6.src.rpm
    MD5: 2eeb5c2c3e1a89ddfc3bd3142b43605bSHA-256: 00589845762d75872eb858b7e42e9fb653f28f8b42fe9d53d5966d7752b56379
 
IA-32:
gnupg2-2.0.14-8.el6.i686.rpm
    MD5: 965f73c49d1f89fc0b8f3d40094b508dSHA-256: f242dcb015d53fe3db192d33111d268b5f6fc9f56a3506b712007bfe8e6291ac
gnupg2-debuginfo-2.0.14-8.el6.i686.rpm
    MD5: 7cc6cf0517cb4b9ddd79823c6e8a2df7SHA-256: d67c2e4ea813bbefcc8818c0bd8c471405232e71e62f56dbd5b955ab6e161a8e
gnupg2-smime-2.0.14-8.el6.i686.rpm
    MD5: fe1ab88b86307af85313434458f51dddSHA-256: 9b3276827ac7b5faef6e0b4fa6303cbda8287de26cb913a8a69a0637194be4ba
 
x86_64:
gnupg2-2.0.14-8.el6.x86_64.rpm
    MD5: 197348bf31ecba2cab250a4e8b9412e3SHA-256: 354262f1fed8e1a8f7204d18e29ca3d84511ebe88a14039ad39b33b363dd0215
gnupg2-debuginfo-2.0.14-8.el6.x86_64.rpm
    MD5: 8f0e48cdf806b1b0c1cef1d7904cf425SHA-256: 5e4d070a21591225796dd4e15007cae05c73fc564ce973f2c9eef886d025e2a5
gnupg2-smime-2.0.14-8.el6.x86_64.rpm
    MD5: 1d49849945481a0a7511e991f5d3d232SHA-256: c512c6436ec7bdda27da75abca1e038ad6092c3bd47b88e9bbd1e0cf81507d95
 
Red Hat Enterprise Linux HPC Node FasTrack (v. 6)

SRPMS:
gnupg2-2.0.14-8.el6.src.rpm
    MD5: 2eeb5c2c3e1a89ddfc3bd3142b43605bSHA-256: 00589845762d75872eb858b7e42e9fb653f28f8b42fe9d53d5966d7752b56379
 
x86_64:
gnupg2-2.0.14-8.el6.x86_64.rpm
    MD5: 197348bf31ecba2cab250a4e8b9412e3SHA-256: 354262f1fed8e1a8f7204d18e29ca3d84511ebe88a14039ad39b33b363dd0215
gnupg2-debuginfo-2.0.14-8.el6.x86_64.rpm
    MD5: 8f0e48cdf806b1b0c1cef1d7904cf425SHA-256: 5e4d070a21591225796dd4e15007cae05c73fc564ce973f2c9eef886d025e2a5
gnupg2-smime-2.0.14-8.el6.x86_64.rpm
    MD5: 1d49849945481a0a7511e991f5d3d232SHA-256: c512c6436ec7bdda27da75abca1e038ad6092c3bd47b88e9bbd1e0cf81507d95
 
Red Hat Enterprise Linux Server FasTrack (v. 6)

SRPMS:
gnupg2-2.0.14-8.el6.src.rpm
    MD5: 2eeb5c2c3e1a89ddfc3bd3142b43605bSHA-256: 00589845762d75872eb858b7e42e9fb653f28f8b42fe9d53d5966d7752b56379
 
IA-32:
gnupg2-2.0.14-8.el6.i686.rpm
    MD5: 965f73c49d1f89fc0b8f3d40094b508dSHA-256: f242dcb015d53fe3db192d33111d268b5f6fc9f56a3506b712007bfe8e6291ac
gnupg2-debuginfo-2.0.14-8.el6.i686.rpm
    MD5: 7cc6cf0517cb4b9ddd79823c6e8a2df7SHA-256: d67c2e4ea813bbefcc8818c0bd8c471405232e71e62f56dbd5b955ab6e161a8e
gnupg2-smime-2.0.14-8.el6.i686.rpm
    MD5: fe1ab88b86307af85313434458f51dddSHA-256: 9b3276827ac7b5faef6e0b4fa6303cbda8287de26cb913a8a69a0637194be4ba
 
PPC:
gnupg2-2.0.14-8.el6.ppc64.rpm
    MD5: 998fe1586487dd4ed5a6996efb62324dSHA-256: d74e61f1e126a6c51eae751ef568c366f4b8e6671b68569cffef3a86f214151e
gnupg2-debuginfo-2.0.14-8.el6.ppc64.rpm
    MD5: 29952ffbae227897cf3d2eff3ffa363aSHA-256: a82a45ade8eb8ff8447c70f6f337e43cb65424a6f81a6d910a15556c05adeeb8
gnupg2-smime-2.0.14-8.el6.ppc64.rpm
    MD5: 459b3991600b39275ef54f73fa0b3dd7SHA-256: 14b606f1696c45c11a8db9b0d1c4eb0a09112a1ffe5423239d18645333ce1623
 
s390x:
gnupg2-2.0.14-8.el6.s390x.rpm
    MD5: 465df75639974f9bb0ad9b3f5f824166SHA-256: fef8a6f7fecae68249f021a6826d7366331aee402712f8600b8f02cca98682f9
gnupg2-debuginfo-2.0.14-8.el6.s390x.rpm
    MD5: ce691f18ad8daf46d76630d70343bae2SHA-256: 8b597c08d55480966a1c83883fc55055f21226f3998c34cf24ac973427d6d627
gnupg2-smime-2.0.14-8.el6.s390x.rpm
    MD5: 996ee14a8d320dc3b157b7f4b7b0d5c5SHA-256: 1e4f1c2cd2c8a997e6bc81929d2a1a2200fdd72e18619141aa0e0b6a898f28b5
 
x86_64:
gnupg2-2.0.14-8.el6.x86_64.rpm
    MD5: 197348bf31ecba2cab250a4e8b9412e3SHA-256: 354262f1fed8e1a8f7204d18e29ca3d84511ebe88a14039ad39b33b363dd0215
gnupg2-debuginfo-2.0.14-8.el6.x86_64.rpm
    MD5: 8f0e48cdf806b1b0c1cef1d7904cf425SHA-256: 5e4d070a21591225796dd4e15007cae05c73fc564ce973f2c9eef886d025e2a5
gnupg2-smime-2.0.14-8.el6.x86_64.rpm
    MD5: 1d49849945481a0a7511e991f5d3d232SHA-256: c512c6436ec7bdda27da75abca1e038ad6092c3bd47b88e9bbd1e0cf81507d95
 
Red Hat Enterprise Linux Workstation FasTrack (v. 6)

SRPMS:
gnupg2-2.0.14-8.el6.src.rpm
    MD5: 2eeb5c2c3e1a89ddfc3bd3142b43605bSHA-256: 00589845762d75872eb858b7e42e9fb653f28f8b42fe9d53d5966d7752b56379
 
IA-32:
gnupg2-2.0.14-8.el6.i686.rpm
    MD5: 965f73c49d1f89fc0b8f3d40094b508dSHA-256: f242dcb015d53fe3db192d33111d268b5f6fc9f56a3506b712007bfe8e6291ac
gnupg2-debuginfo-2.0.14-8.el6.i686.rpm
    MD5: 7cc6cf0517cb4b9ddd79823c6e8a2df7SHA-256: d67c2e4ea813bbefcc8818c0bd8c471405232e71e62f56dbd5b955ab6e161a8e
gnupg2-smime-2.0.14-8.el6.i686.rpm
    MD5: fe1ab88b86307af85313434458f51dddSHA-256: 9b3276827ac7b5faef6e0b4fa6303cbda8287de26cb913a8a69a0637194be4ba
 
x86_64:
gnupg2-2.0.14-8.el6.x86_64.rpm
    MD5: 197348bf31ecba2cab250a4e8b9412e3SHA-256: 354262f1fed8e1a8f7204d18e29ca3d84511ebe88a14039ad39b33b363dd0215
gnupg2-debuginfo-2.0.14-8.el6.x86_64.rpm
    MD5: 8f0e48cdf806b1b0c1cef1d7904cf425SHA-256: 5e4d070a21591225796dd4e15007cae05c73fc564ce973f2c9eef886d025e2a5
gnupg2-smime-2.0.14-8.el6.x86_64.rpm
    MD5: 1d49849945481a0a7511e991f5d3d232SHA-256: c512c6436ec7bdda27da75abca1e038ad6092c3bd47b88e9bbd1e0cf81507d95
 
(The unlinked packages above are only available from the Red Hat Network)
1078957 – gpg –verify coredumps when verifying a signature with RIPEMD160 digest in FIPS mode638635 – gpg-agent fails to encode “iteration count” into private keys, thus never unprotects secret key966493 – symmetric encryption/decryption doesn’t work in FIPS mode

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply