gnupg: update to 1.4.22

Message ID 20180324163253.6f7d8546.peter.mueller@link38.eu
State Accepted
Commit 689fed340aab91240b51bf4da1daf0a606290ac1
Headers
Series gnupg: update to 1.4.22 |

Commit Message

Peter Müller March 25, 2018, 2:32 a.m. UTC
  Update GnuPG to 1.4.22, which fixes some security vulnerabilities,
such as the memory side channel attack CVE-2017-7526.

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
---
 lfs/gnupg | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)
  

Comments

Michael Tremer March 27, 2018, 5:10 a.m. UTC | #1
Hello,

also pulled into next for C120.

-Michael

On Sat, 2018-03-24 at 16:32 +0100, Peter Müller wrote:
> Update GnuPG to 1.4.22, which fixes some security vulnerabilities,
> such as the memory side channel attack CVE-2017-7526.
> 
> Signed-off-by: Peter Müller <peter.mueller@link38.eu>
> ---
>  lfs/gnupg | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/lfs/gnupg b/lfs/gnupg
> index aa76042e3..f131d2b08 100644
> --- a/lfs/gnupg
> +++ b/lfs/gnupg
> @@ -24,7 +24,7 @@
>  
>  include Config
>  
> -VER        = 1.4.21
> +VER        = 1.4.22
>  
>  THISAPP    = gnupg-$(VER)
>  DL_FILE    = $(THISAPP).tar.bz2
> @@ -40,7 +40,7 @@ objects = $(DL_FILE)
>  
>  $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
>  
> -$(DL_FILE)_MD5 = 9bdeabf3c0f87ff21cb3f9216efdd01d
> +$(DL_FILE)_MD5 = 082bda3951a94743e76b83fcf3627547
>  
>  install : $(TARGET)
>
  

Patch

diff --git a/lfs/gnupg b/lfs/gnupg
index aa76042e3..f131d2b08 100644
--- a/lfs/gnupg
+++ b/lfs/gnupg
@@ -24,7 +24,7 @@ 
 
 include Config
 
-VER        = 1.4.21
+VER        = 1.4.22
 
 THISAPP    = gnupg-$(VER)
 DL_FILE    = $(THISAPP).tar.bz2
@@ -40,7 +40,7 @@  objects = $(DL_FILE)
 
 $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
 
-$(DL_FILE)_MD5 = 9bdeabf3c0f87ff21cb3f9216efdd01d
+$(DL_FILE)_MD5 = 082bda3951a94743e76b83fcf3627547
 
 install : $(TARGET)