From mboxrd@z Thu Jan 1 00:00:00 1970 From: Peter =?utf-8?q?M=C3=BCller?= To: development@lists.ipfire.org Subject: [PATCH] gnupg: update to 1.4.22 Date: Sat, 24 Mar 2018 16:32:53 +0100 Message-ID: <20180324163253.6f7d8546.peter.mueller@link38.eu> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============2124006922910088750==" List-Id: --===============2124006922910088750== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Update GnuPG to 1.4.22, which fixes some security vulnerabilities, such as the memory side channel attack CVE-2017-7526. Signed-off-by: Peter Müller --- lfs/gnupg | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/lfs/gnupg b/lfs/gnupg index aa76042e3..f131d2b08 100644 --- a/lfs/gnupg +++ b/lfs/gnupg @@ -24,7 +24,7 @@ include Config -VER = 1.4.21 +VER = 1.4.22 THISAPP = gnupg-$(VER) DL_FILE = $(THISAPP).tar.bz2 @@ -40,7 +40,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_MD5 = 9bdeabf3c0f87ff21cb3f9216efdd01d +$(DL_FILE)_MD5 = 082bda3951a94743e76b83fcf3627547 install : $(TARGET) -- 2.13.6 --===============2124006922910088750==--