aboutsummaryrefslogtreecommitdiff
path: root/security/gnupg
diff options
context:
space:
mode:
authorAdam Weinberger <adamw@FreeBSD.org>2020-09-04 02:12:38 +0000
committerAdam Weinberger <adamw@FreeBSD.org>2020-09-04 02:12:38 +0000
commitf916fe70ddedb89587f63f2cd9d00f883ba5e596 (patch)
tree15b95e690097e6aa341593c2f46b10d4d2d0009f /security/gnupg
parent6a6a68433ccfc30db55cd4bb3faaff34efcc757f (diff)
downloadports-f916fe70ddedb89587f63f2cd9d00f883ba5e596.tar.gz
ports-f916fe70ddedb89587f63f2cd9d00f883ba5e596.zip
security/gnupg: Update to 2.2.23
Importing an OpenPGP key having a preference list for AEAD algorithms will lead to an array overflow and thus often to a crash or other undefined behaviour. Importing an arbitrary key can often easily be triggered by an attacker and thus triggering this bug. Exploiting the bug aside from crashes is not trivial but likely possible for a dedicated attacker. The major hurdle for an attacker is that only every second byte is under their control with every first byte having a fixed value of 0x04. Software distribution verification should not be affected by this bug because such a system uses a curated list of keys. MFH: 2020Q3 Security: CVE-2020-25125
Notes
Notes: svn path=/head/; revision=547499
Diffstat (limited to 'security/gnupg')
-rw-r--r--security/gnupg/Makefile3
-rw-r--r--security/gnupg/distinfo6
2 files changed, 5 insertions, 4 deletions
diff --git a/security/gnupg/Makefile b/security/gnupg/Makefile
index 64d392db71e8..fef6d23e76f6 100644
--- a/security/gnupg/Makefile
+++ b/security/gnupg/Makefile
@@ -1,7 +1,7 @@
# $FreeBSD$
PORTNAME= gnupg
-PORTVERSION= 2.2.22
+PORTVERSION= 2.2.23
CATEGORIES= security
MASTER_SITES= GNUPG
@@ -31,6 +31,7 @@ CONFIGURE_ARGS= --disable-ntbtls --enable-gpg-is-gpg2 --enable-symcryptrun
GNU_CONFIGURE= yes
INFO= gnupg
TEST_TARGET= check
+TEST_ARGS= TESTARGS=--parallel
SUB_FILES= pkg-message
diff --git a/security/gnupg/distinfo b/security/gnupg/distinfo
index ba6c14518aa7..271c5cd064c8 100644
--- a/security/gnupg/distinfo
+++ b/security/gnupg/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1598556721
-SHA256 (gnupg-2.2.22.tar.bz2) = 7c1370565e1910b9d8c4e0fb57b9de34aa062ec7bb91abad5803d791f38d855b
-SIZE (gnupg-2.2.22.tar.bz2) = 7098444
+TIMESTAMP = 1599184354
+SHA256 (gnupg-2.2.23.tar.bz2) = 10b55e49d78b3e49f1edb58d7541ecbdad92ddaeeb885b6f486ed23d1cd1da5c
+SIZE (gnupg-2.2.23.tar.bz2) = 7099806