From mboxrd@z Thu Jan 1 00:00:00 1970 From: Michael Tremer To: development@lists.ipfire.org Subject: Re: [PATCH] gnupg: update to 1.4.22 Date: Mon, 26 Mar 2018 19:10:28 +0100 Message-ID: <1522087828.556038.37.camel@ipfire.org> In-Reply-To: <20180324163253.6f7d8546.peter.mueller@link38.eu> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============8046578817721468333==" List-Id: --===============8046578817721468333== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Hello, also pulled into next for C120. -Michael On Sat, 2018-03-24 at 16:32 +0100, Peter Müller wrote: > Update GnuPG to 1.4.22, which fixes some security vulnerabilities, > such as the memory side channel attack CVE-2017-7526. > > Signed-off-by: Peter Müller > --- > lfs/gnupg | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/lfs/gnupg b/lfs/gnupg > index aa76042e3..f131d2b08 100644 > --- a/lfs/gnupg > +++ b/lfs/gnupg > @@ -24,7 +24,7 @@ > > include Config > > -VER = 1.4.21 > +VER = 1.4.22 > > THISAPP = gnupg-$(VER) > DL_FILE = $(THISAPP).tar.bz2 > @@ -40,7 +40,7 @@ objects = $(DL_FILE) > > $(DL_FILE) = $(DL_FROM)/$(DL_FILE) > > -$(DL_FILE)_MD5 = 9bdeabf3c0f87ff21cb3f9216efdd01d > +$(DL_FILE)_MD5 = 082bda3951a94743e76b83fcf3627547 > > install : $(TARGET) > --===============8046578817721468333==--