package/gnupg2: security bump to version 2.2.23
Fixes the following security issues: CVE-2020-25125: Importing an OpenPGP key having a preference list for AEAD algorithms will lead to an array overflow and thus often to a crash or other undefined behaviour (affected: 2.2.21 / 2.2.22) For more details, see the announcement: https://lists.gnupg.org/pipermail/gnupg-announce/2020q3/000448.html Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
This commit is contained in:
parent
d27b5c7b72
commit
918a9fb455
@ -1,7 +1,7 @@
|
||||
# From https://lists.gnupg.org/pipermail/gnupg-announce/2020q3/000446.html
|
||||
sha1 4af4c6fe5f9dd7d866243f715b32775500468943 gnupg-2.2.21.tar.bz2
|
||||
# From https://lists.gnupg.org/pipermail/gnupg-announce/2020q3/000448.html
|
||||
sha1 bd949b4af7426e4afc13667d678503063c6aa4b5 gnupg-2.2.23.tar.bz2
|
||||
# Calculated based on the hash above and signature
|
||||
# https://gnupg.org/ftp/gcrypt/gnupg/gnupg-2.2.21.tar.bz2.sig
|
||||
# https://gnupg.org/ftp/gcrypt/gnupg/gnupg-2.2.23.tar.bz2.sig
|
||||
# using key D8692123C4065DEA5E0F3AB5249B39D24F25E3B6
|
||||
sha256 61e83278fb5fa7336658a8b73ab26f379d41275bb1c7c6e694dd9f9a6e8e76ec gnupg-2.2.21.tar.bz2
|
||||
sha256 10b55e49d78b3e49f1edb58d7541ecbdad92ddaeeb885b6f486ed23d1cd1da5c gnupg-2.2.23.tar.bz2
|
||||
sha256 bc2d6664f6276fa0a72d57633b3ae68dc7dcb677b71018bf08c8e93e509f1357 COPYING
|
||||
|
@ -4,7 +4,7 @@
|
||||
#
|
||||
################################################################################
|
||||
|
||||
GNUPG2_VERSION = 2.2.21
|
||||
GNUPG2_VERSION = 2.2.23
|
||||
GNUPG2_SOURCE = gnupg-$(GNUPG2_VERSION).tar.bz2
|
||||
GNUPG2_SITE = https://gnupg.org/ftp/gcrypt/gnupg
|
||||
GNUPG2_LICENSE = GPL-3.0+
|
||||
|
Loading…
Reference in New Issue
Block a user