diff mbox

gnupg: security bump to version 1.4.17

Message ID 1403721714-14795-1-git-send-email-gustavo@zacarias.com.ar
State Accepted
Commit 2402634f5a2142202f2b34e206fbebaf58ca1a3c
Headers show

Commit Message

Gustavo Zacarias June 25, 2014, 6:41 p.m. UTC
Fixes CVE-2014-4617: The do_uncompress function in g10/compress.c in
GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent
attackers to cause a denial of service (infinite loop) via malformed
compressed packets, as demonstrated by an a3 01 5b ff byte sequence.

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
---
 package/gnupg/gnupg.mk | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Comments

Peter Korsgaard June 25, 2014, 8:30 p.m. UTC | #1
>>>>> "Gustavo" == Gustavo Zacarias <gustavo@zacarias.com.ar> writes:

 > Fixes CVE-2014-4617: The do_uncompress function in g10/compress.c in
 > GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent
 > attackers to cause a denial of service (infinite loop) via malformed
 > compressed packets, as demonstrated by an a3 01 5b ff byte sequence.

 > Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>

Committed, thanks.
diff mbox

Patch

diff --git a/package/gnupg/gnupg.mk b/package/gnupg/gnupg.mk
index c334ac6..4c96967 100644
--- a/package/gnupg/gnupg.mk
+++ b/package/gnupg/gnupg.mk
@@ -4,7 +4,7 @@ 
 #
 ################################################################################
 
-GNUPG_VERSION = 1.4.16
+GNUPG_VERSION = 1.4.17
 GNUPG_SOURCE = gnupg-$(GNUPG_VERSION).tar.bz2
 GNUPG_SITE = ftp://ftp.gnupg.org/gcrypt/gnupg
 GNUPG_LICENSE = GPLv3+