ports/opt (3.0): [notify] gnupg: 2.0.23 -> 2.0.24, fixes CVE-2014-4617
commit c5ea321a11c3a4dd0c6c6c8f62b58ca6a18abeb8 Author: Thomas Penteker <tek@serverop.de> Date: Wed Jun 25 01:04:13 2014 +0200 [notify] gnupg: 2.0.23 -> 2.0.24, fixes CVE-2014-4617 The update avoids infinite loop in uncompressing garbled packets. diff --git a/gnupg/.md5sum b/gnupg/.md5sum index 7a7c38a..ae993ac 100644 --- a/gnupg/.md5sum +++ b/gnupg/.md5sum @@ -1 +1 @@ -1c30b3aa1f99f17b4988e1ab616355d4 gnupg-2.0.23.tar.bz2 +94cd984321b44ab622aa50f93ee66671 gnupg-2.0.24.tar.bz2 diff --git a/gnupg/Pkgfile b/gnupg/Pkgfile index 0bc567d..4581ebb 100644 --- a/gnupg/Pkgfile +++ b/gnupg/Pkgfile @@ -5,7 +5,7 @@ # Depends on: libgcrypt, libassuan, libksba, pinentry, libpth name=gnupg -version=2.0.23 +version=2.0.24 release=1 source=(ftp://ftp.gnupg.org/gcrypt/$name/$name-$version.tar.bz2)
participants (1)
-
crux@crux.nu