summaryrefslogtreecommitdiffstats
path: root/package/gnupg/gnupg.mk
diff options
context:
space:
mode:
authorBaruch Siach <baruch@tkos.co.il>2016-08-18 10:39:11 +0300
committerPeter Korsgaard <peter@korsgaard.com>2016-08-18 10:57:45 +0200
commit4debfc914b6b94a41f8b8d53c452010032d048c2 (patch)
tree76d210fb2d1b9f9b2828495b894726010a2fa5de /package/gnupg/gnupg.mk
parent55c74d6b974cc7508e9855e8579ddd2115c80b2b (diff)
downloadbuildroot-4debfc914b6b94a41f8b8d53c452010032d048c2.tar.gz
buildroot-4debfc914b6b94a41f8b8d53c452010032d048c2.zip
gnupg: security bump to version 1.4.21
Fixes CVE-2016-6313: An attacker who obtains 580 bytes from the standard RNG can trivially predict the next 20 bytes of output. Add cryptographically secure sha256 hash. Signed-off-by: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Diffstat (limited to 'package/gnupg/gnupg.mk')
-rw-r--r--package/gnupg/gnupg.mk2
1 files changed, 1 insertions, 1 deletions
diff --git a/package/gnupg/gnupg.mk b/package/gnupg/gnupg.mk
index 54f4d97365..182abd6709 100644
--- a/package/gnupg/gnupg.mk
+++ b/package/gnupg/gnupg.mk
@@ -4,7 +4,7 @@
#
################################################################################
-GNUPG_VERSION = 1.4.20
+GNUPG_VERSION = 1.4.21
GNUPG_SOURCE = gnupg-$(GNUPG_VERSION).tar.bz2
GNUPG_SITE = ftp://ftp.gnupg.org/gcrypt/gnupg
GNUPG_LICENSE = GPLv3+
OpenPOWER on IntegriCloud