gnupg2: security bump to version 2.0.25
authorGustavo Zacarias <gustavo@zacarias.com.ar>
Mon, 4 Aug 2014 17:48:02 +0000 (14:48 -0300)
committerThomas Petazzoni <thomas.petazzoni@free-electrons.com>
Mon, 4 Aug 2014 18:08:54 +0000 (20:08 +0200)
Fixes CVE-2014-4617 (The do_uncompress function in g10/compress.c
allows context-dependent attackers to cause a denial of service
(infinite loop) via malformed compressed packets, as demonstrated by an
a3 01 5b ff byte sequence.

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
package/gnupg2/gnupg2.mk

index fd35e6e3faccf6867fe28d979bb3c384b294dc64..9502a8241b055eeecd1083015403b7edb55f4e11 100644 (file)
@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-GNUPG2_VERSION = 2.0.23
+GNUPG2_VERSION = 2.0.25
 GNUPG2_SOURCE = gnupg-$(GNUPG2_VERSION).tar.bz2
 GNUPG2_SITE = ftp://ftp.gnupg.org/gcrypt/gnupg
 GNUPG2_LICENSE = GPLv3+