diff options
author | Ross Burton <ross.burton@intel.com> | 2013-04-29 14:47:22 +0100 |
---|---|---|
committer | Ross Burton <ross.burton@intel.com> | 2013-04-29 14:56:03 +0100 |
commit | 44ed6605c1978325782d229d0c01329465c4c5c7 (patch) | |
tree | 4b8ca55601cb689413ecbd7bb61348bab31bc41f /meta/recipes-support/gnupg/gnupg_2.0.19.bb | |
parent | 9ab2fc380fe8b6e48c6501a4630cc3c583ed2da5 (diff) | |
download | openembedded-core-44ed6605c1978325782d229d0c01329465c4c5c7.tar.gz |
gnupg: integrate fix for CVE-2012-6085
From http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6085:
"The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x
through 2.0.19, when importing a key, allows remote attackers to corrupt the
public keyring database or cause a denial of service (application crash) via a
crafted length field of an OpenPGP packet."
Patch taken from upstream git, which is identical in both branches.
Signed-off-by: Ross Burton <ross.burton@intel.com>
Diffstat (limited to 'meta/recipes-support/gnupg/gnupg_2.0.19.bb')
-rw-r--r-- | meta/recipes-support/gnupg/gnupg_2.0.19.bb | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/meta/recipes-support/gnupg/gnupg_2.0.19.bb b/meta/recipes-support/gnupg/gnupg_2.0.19.bb index 996a8e80dc..6b0ce668f5 100644 --- a/meta/recipes-support/gnupg/gnupg_2.0.19.bb +++ b/meta/recipes-support/gnupg/gnupg_2.0.19.bb @@ -11,7 +11,8 @@ PR = "r4" inherit autotools gettext -SRC_URI = "ftp://ftp.gnupg.org/gcrypt/${BPN}/${BPN}-${PV}.tar.bz2" +SRC_URI = "ftp://ftp.gnupg.org/gcrypt/${BPN}/${BPN}-${PV}.tar.bz2 \ + file://cve-2012-6085.patch" SRC_URI[md5sum] = "6a8589381ca1b0c1a921e9955f42b016" SRC_URI[sha256sum] = "efa23a8a925adb51c7d3b708c25b6d000300f5ce37de9bdec6453be7b419c622" |