It was reported that new GnuPG-1 release available that includes a security fix to stop a possible DoS using garbled compressed data packets which can be used to put gpg into an infinite loop. [1]: http://seclists.org/oss-sec/2014/q2/619 Upstream patch: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commitdiff;h=11fdfcf82bd8 Upstream announce: http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html
Created gnupg tracking bugs for this issue: Affects: fedora-all [bug 1112682]
*** This bug has been marked as a duplicate of bug 1112509 ***