summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authortaca <taca>2006-11-28 05:39:41 +0000
committertaca <taca>2006-11-28 05:39:41 +0000
commit55e9368bd683acff8000b990ac0aa4f6bb36cc0b (patch)
tree00a27e63f80d94d220fa2da42220dd70d3a86f08 /security
parentac387487bb338ace81af346db98bc8259a5e2a9c (diff)
downloadpkgsrc-55e9368bd683acff8000b990ac0aa4f6bb36cc0b.tar.gz
Add the same patch as security/gnupg2 package to fix a buffer overflow.
While fixing a bug reported by Hugh Warrington, a buffer overflow has been identified in all released GnuPG versions. The current versions 1.4.5 and 2.0.0 are affected. A small patch is provided. ... 2006-11-27 Werner Koch <wk@g10code.com> * openfile.c (ask_outfile_name): Fixed buffer overflow occurring if make_printable_string returns a longer string. Fixes bug 728. Bump PKGREVISION.
Diffstat (limited to 'security')
-rw-r--r--security/gnupg/Makefile3
-rw-r--r--security/gnupg/distinfo3
-rw-r--r--security/gnupg/patches/patch-al15
3 files changed, 19 insertions, 2 deletions
diff --git a/security/gnupg/Makefile b/security/gnupg/Makefile
index a780eec6b1c..026c3203f5e 100644
--- a/security/gnupg/Makefile
+++ b/security/gnupg/Makefile
@@ -1,6 +1,7 @@
-# $NetBSD: Makefile,v 1.91 2006/11/03 07:45:44 joerg Exp $
+# $NetBSD: Makefile,v 1.92 2006/11/28 05:39:41 taca Exp $
DISTNAME= gnupg-1.4.5
+PKGREVISION= 1
CATEGORIES= security
MASTER_SITES= ftp://ftp.gnupg.org/gcrypt/gnupg/ \
ftp://ftp.planetmirror.com/pub/gnupg/ \
diff --git a/security/gnupg/distinfo b/security/gnupg/distinfo
index 8c888efab3b..a38d7ce8d08 100644
--- a/security/gnupg/distinfo
+++ b/security/gnupg/distinfo
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.43 2006/08/02 10:37:34 drochner Exp $
+$NetBSD: distinfo,v 1.44 2006/11/28 05:39:41 taca Exp $
SHA1 (gnupg-1.4.5.tar.bz2) = 553fefe0da5a91108dd9468e381faf9487754f9a
RMD160 (gnupg-1.4.5.tar.bz2) = f27447b3aec1423ac10c3a5b4745ea3b13c5a5e5
@@ -9,3 +9,4 @@ Size (idea.c.gz) = 5216 bytes
SHA1 (patch-aa) = 91d55ca22b58e8a1f3c17a2fd0ad888d4c85c6cf
SHA1 (patch-ab) = 29a7d0b736322eb1ecf0925a2419b513f323000e
SHA1 (patch-ak) = 89a6a7552104f4d5b97a98889da88fca68c54f31
+SHA1 (patch-al) = 504ff52178d9ffa36f14d6741e4805c212156c0e
diff --git a/security/gnupg/patches/patch-al b/security/gnupg/patches/patch-al
new file mode 100644
index 00000000000..3b08605939c
--- /dev/null
+++ b/security/gnupg/patches/patch-al
@@ -0,0 +1,15 @@
+$NetBSD: patch-al,v 1.1 2006/11/28 05:39:42 taca Exp $
+
+# http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html
+
+--- ./g10/openfile.c.orig 2006-09-14 08:18:39.000000000 -0600
++++ ./g10/openfile.c
+@@ -145,7 +145,7 @@ ask_outfile_name( const char *name, size
+
+ s = _("Enter new filename");
+
+- n = strlen(s) + namelen + 10;
++ n = strlen(s) + (defname?strlen (defname):0) + 10;
+ defname = name && namelen? make_printable_string( name, namelen, 0): NULL;
+ prompt = xmalloc(n);
+ if( defname )