It was reported that upcoming GnuPG-2 release will include a security fix to stop a possible DoS using garbled compressed data packets which can be used to put gpg into an infinite loop. [1]: http://seclists.org/oss-sec/2014/q2/626 Upstream patch: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commitdiff;h=014b2103fcb1
Created gnupg2 tracking bugs for this issue: Affects: fedora-all [bug 1112681] Affects: epel-5 [bug 1112683]
*** This bug has been marked as a duplicate of bug 1112509 ***