- Upgrade to 1.4.6 (including security fix).

Security:	CVE-2006-6235
References:	http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html
This commit is contained in:
Jun Kuriyama 2006-12-07 00:34:17 +00:00
parent ed77a98df8
commit fd6c552828
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=179069
3 changed files with 9 additions and 21 deletions

View file

@ -6,8 +6,7 @@
#
PORTNAME= gnupg
PORTVERSION= 1.4.5
PORTREVISION= 2
PORTVERSION= 1.4.6
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_GNUPG}
MASTER_SITE_SUBDIR= gnupg
@ -21,13 +20,14 @@ USE_BZIP2= YES
USE_GMAKE= YES
GNU_CONFIGURE= YES
CONFIGURE_TARGET= --build ${MACHINE_ARCH}-portbld-freebsd${OSREL}
CONFIGURE_ARGS= --infodir=${PREFIX}/info --mandir=${PREFIX}/man
.if ${MACHINE_CPU:Mi586}
MACHINE_ARCH= i586
.endif
CFLAGS:= ${CFLAGS:S/-pipe//g}
MAN1= gpg.1 gpgv.1 gpg.ru.1
MAN7= gnupg.7
INFO= gpg gpgv
INFO= gnupg1
PORTDOCS= *

View file

@ -1,6 +1,6 @@
MD5 (gnupg-1.4.5.tar.bz2) = 811525965b4c0987e6418a7729a6444d
SHA256 (gnupg-1.4.5.tar.bz2) = f30a2679ed6bed71b4af6919cd9b963c896fca64e42eeb0536788cb41b2e1805
SIZE (gnupg-1.4.5.tar.bz2) = 3089617
MD5 (gnupg-1.4.5.tar.bz2.sig) = 5e34f226515d46d2c6c7a56ad1d95c1e
SHA256 (gnupg-1.4.5.tar.bz2.sig) = e0284086b4468f5b9970fe2adb7cd632be69693f5590e7c9a27f9271fb8497a2
SIZE (gnupg-1.4.5.tar.bz2.sig) = 158
MD5 (gnupg-1.4.6.tar.bz2) = ec8dc6df1bd83c1d7e1a1ea10653f9f4
SHA256 (gnupg-1.4.6.tar.bz2) = fd5a72418e55669b88076c2a6f11c3a59bf92a2071008567e65ae12b7372008e
SIZE (gnupg-1.4.6.tar.bz2) = 3149454
MD5 (gnupg-1.4.6.tar.bz2.sig) = 8b905292140d60fe493fab7d5b22c96d
SHA256 (gnupg-1.4.6.tar.bz2.sig) = fb9294762932b34f2fd5a4b168f4c3a248aa7403c2aed8bffa5f67274b1b052d
SIZE (gnupg-1.4.6.tar.bz2.sig) = 158

View file

@ -1,12 +0,0 @@
--- g10/openfile.c.orig Tue Nov 28 07:13:53 2006
+++ g10/openfile.c Tue Nov 28 07:18:30 2006
@@ -144,8 +144,8 @@
s = _("Enter new filename");
- n = strlen(s) + namelen + 10;
defname = name && namelen? make_printable_string( name, namelen, 0): NULL;
+ n = strlen(s) + (defname?strlen (defname):0) + 10;
prompt = xmalloc(n);
if( defname )
sprintf(prompt, "%s [%s]: ", s, defname );