package/gnupg2: security bump to version 2.3.7
Fix CVE-2022-34903: GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line. https://lists.gnupg.org/pipermail/gnupg-announce/2022q3/000474.html Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
This commit is contained in:
parent
868181108a
commit
5a0a9227ba
@ -1,7 +1,7 @@
|
||||
# From https://lists.gnupg.org/pipermail/gnupg-announce/2021q2/000460.html
|
||||
sha1 81684626720c91060ae9920936c768df9fc8b2f6 gnupg-2.2.32.tar.bz2
|
||||
# From https://lists.gnupg.org/pipermail/gnupg-announce/2022q3/000474.html
|
||||
sha1 9255a70a984bfbfa5312a9a52a1cf47cb0d1fc84 gnupg-2.3.7.tar.bz2
|
||||
# Calculated based on the hash above and signature
|
||||
# https://gnupg.org/ftp/gcrypt/gnupg/gnupg-2.2.32.tar.bz2.sig
|
||||
# using key 6DAA6E64A76D2840571B4902528897B826403ADA
|
||||
sha256 b2571b35f82c63e7d278aa6a1add0d73453dc14d3f0854be490c844fca7e0614 gnupg-2.2.32.tar.bz2
|
||||
# https://gnupg.org/ftp/gcrypt/gnupg/gnupg-2.3.7.tar.bz2.sig
|
||||
# using key 02F38DFF731FF97CB039A1DA549E695E905BA208
|
||||
sha256 ee163a5fb9ec99ffc1b18e65faef8d086800c5713d15a672ab57d3799da83669 gnupg-2.3.7.tar.bz2
|
||||
sha256 bc2d6664f6276fa0a72d57633b3ae68dc7dcb677b71018bf08c8e93e509f1357 COPYING
|
||||
|
@ -4,7 +4,7 @@
|
||||
#
|
||||
################################################################################
|
||||
|
||||
GNUPG2_VERSION = 2.2.32
|
||||
GNUPG2_VERSION = 2.3.7
|
||||
GNUPG2_SOURCE = gnupg-$(GNUPG2_VERSION).tar.bz2
|
||||
GNUPG2_SITE = https://gnupg.org/ftp/gcrypt/gnupg
|
||||
GNUPG2_LICENSE = GPL-3.0+
|
||||
|
Loading…
Reference in New Issue
Block a user