gnupg: security bump to version 1.4.21
authorBaruch Siach <baruch@tkos.co.il>
Thu, 18 Aug 2016 07:39:11 +0000 (10:39 +0300)
committerPeter Korsgaard <peter@korsgaard.com>
Thu, 18 Aug 2016 08:57:45 +0000 (10:57 +0200)
commit4debfc914b6b94a41f8b8d53c452010032d048c2
tree76d210fb2d1b9f9b2828495b894726010a2fa5de
parent55c74d6b974cc7508e9855e8579ddd2115c80b2b
gnupg: security bump to version 1.4.21

Fixes CVE-2016-6313: An attacker who obtains 580 bytes from the standard RNG
can trivially predict the next 20 bytes of output.

Add cryptographically secure sha256 hash.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/gnupg/gnupg.hash
package/gnupg/gnupg.mk