diff options
author | Adam Weinberger <adamw@FreeBSD.org> | 2020-09-04 02:12:38 +0000 |
---|---|---|
committer | Adam Weinberger <adamw@FreeBSD.org> | 2020-09-04 02:12:38 +0000 |
commit | f916fe70ddedb89587f63f2cd9d00f883ba5e596 (patch) | |
tree | 15b95e690097e6aa341593c2f46b10d4d2d0009f /security/gnupg | |
parent | 6a6a68433ccfc30db55cd4bb3faaff34efcc757f (diff) | |
download | ports-f916fe70ddedb89587f63f2cd9d00f883ba5e596.tar.gz ports-f916fe70ddedb89587f63f2cd9d00f883ba5e596.zip |
security/gnupg: Update to 2.2.23
Importing an OpenPGP key having a preference list for AEAD algorithms
will lead to an array overflow and thus often to a crash or other
undefined behaviour.
Importing an arbitrary key can often easily be triggered by an attacker
and thus triggering this bug. Exploiting the bug aside from crashes is
not trivial but likely possible for a dedicated attacker. The major
hurdle for an attacker is that only every second byte is under their
control with every first byte having a fixed value of 0x04.
Software distribution verification should not be affected by this bug
because such a system uses a curated list of keys.
MFH: 2020Q3
Security: CVE-2020-25125
Notes
Notes:
svn path=/head/; revision=547499
Diffstat (limited to 'security/gnupg')
-rw-r--r-- | security/gnupg/Makefile | 3 | ||||
-rw-r--r-- | security/gnupg/distinfo | 6 |
2 files changed, 5 insertions, 4 deletions
diff --git a/security/gnupg/Makefile b/security/gnupg/Makefile index 64d392db71e8..fef6d23e76f6 100644 --- a/security/gnupg/Makefile +++ b/security/gnupg/Makefile @@ -1,7 +1,7 @@ # $FreeBSD$ PORTNAME= gnupg -PORTVERSION= 2.2.22 +PORTVERSION= 2.2.23 CATEGORIES= security MASTER_SITES= GNUPG @@ -31,6 +31,7 @@ CONFIGURE_ARGS= --disable-ntbtls --enable-gpg-is-gpg2 --enable-symcryptrun GNU_CONFIGURE= yes INFO= gnupg TEST_TARGET= check +TEST_ARGS= TESTARGS=--parallel SUB_FILES= pkg-message diff --git a/security/gnupg/distinfo b/security/gnupg/distinfo index ba6c14518aa7..271c5cd064c8 100644 --- a/security/gnupg/distinfo +++ b/security/gnupg/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1598556721 -SHA256 (gnupg-2.2.22.tar.bz2) = 7c1370565e1910b9d8c4e0fb57b9de34aa062ec7bb91abad5803d791f38d855b -SIZE (gnupg-2.2.22.tar.bz2) = 7098444 +TIMESTAMP = 1599184354 +SHA256 (gnupg-2.2.23.tar.bz2) = 10b55e49d78b3e49f1edb58d7541ecbdad92ddaeeb885b6f486ed23d1cd1da5c +SIZE (gnupg-2.2.23.tar.bz2) = 7099806 |