"parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length, which could lead to an integer overflow, as demonstrated using the --no-armor option." Patch from GnuPG CVS repository. Bump PKGREVISION.
12 lines
630 B
Text
12 lines
630 B
Text
$NetBSD: distinfo,v 1.40 2006/06/24 14:20:29 salo Exp $
|
|
|
|
SHA1 (gnupg-1.4.3.tar.bz2) = 9e96b36e4f4d1e8bc5028c99fac674482cbdb370
|
|
RMD160 (gnupg-1.4.3.tar.bz2) = f6d328785f41b74f97d25305c6fe95ad45bb70a5
|
|
Size (gnupg-1.4.3.tar.bz2) = 3114088 bytes
|
|
SHA1 (idea.c.gz) = 82fded4ec31b97b3b2dd22741880b67cfee40f84
|
|
RMD160 (idea.c.gz) = e35be5a031d10d52341ac5f029d28f811edd908d
|
|
Size (idea.c.gz) = 5216 bytes
|
|
SHA1 (patch-aa) = 91d55ca22b58e8a1f3c17a2fd0ad888d4c85c6cf
|
|
SHA1 (patch-ab) = 29a7d0b736322eb1ecf0925a2419b513f323000e
|
|
SHA1 (patch-ak) = 89a6a7552104f4d5b97a98889da88fca68c54f31
|
|
SHA1 (patch-ba) = d32db008ec704dacf382da4f43ad6b3f0de88dcb
|