Browse Source

[gnupg2] Updated (2.0.7 -> 2.0.9) : SECURITY - HIGH

CVE-2008-1530 (High) :
GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and
possibly execute arbitrary code via crafted duplicate keys that are imported from key servers,
which triggers "memory corruption around deduplication of user IDs."
early
Aldas Nabazas 17 years ago
parent
commit
600b74f310
  1. 7
      security/gnupg2/gnupg2.desc

7
security/gnupg2/gnupg2.desc

@ -2,7 +2,7 @@
[COPY] This copyright note is auto-generated by ./scripts/Create-CopyPatch.
[COPY]
[COPY] Filename: package/.../gnupg2/gnupg2.desc
[COPY] Copyright (C) 2006 - 2007 The OpenSDE Project
[COPY] Copyright (C) 2006 - 2008 The OpenSDE Project
[COPY] Copyright (C) 2004 - 2006 The T2 SDE Project
[COPY]
[COPY] More information can be found in the files COPYING and README.
@ -28,8 +28,7 @@
[L] GPL
[S] Stable
[V] 2.0.7
[V] 2.0.9
[P] X -----5---9 118.201
[D] 4240175667 gnupg-2.0.7.tar.bz2 ftp://ftp.gnupg.org/gcrypt/gnupg/
[D] 1538996167 gnupg-2.0.9.tar.bz2 ftp://ftp.gnupg.org/gcrypt/gnupg/

Loading…
Cancel
Save