gnupg: security bump to version 1.4.17
Fixes CVE-2014-4617: The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence. Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
This commit is contained in:
parent
2001bf94bf
commit
2402634f5a
@ -4,7 +4,7 @@
|
||||
#
|
||||
################################################################################
|
||||
|
||||
GNUPG_VERSION = 1.4.16
|
||||
GNUPG_VERSION = 1.4.17
|
||||
GNUPG_SOURCE = gnupg-$(GNUPG_VERSION).tar.bz2
|
||||
GNUPG_SITE = ftp://ftp.gnupg.org/gcrypt/gnupg
|
||||
GNUPG_LICENSE = GPLv3+
|
||||
|
Loading…
Reference in New Issue
Block a user