Commit Graph

40 Commits

Author SHA1 Message Date
pea
12acb9279b Bugfixes update to 1.4.11
ok benoit@
2010-10-25 12:57:13 +00:00
bernd
5e84793fd4 Update to gnupg-1.4.8. (GPLv3 now)
ok steven@
2008-01-30 20:18:09 +00:00
steven
66d8f55f87 update to 1.4.7
feedback and ok bernd@
2007-05-10 11:38:28 +00:00
steven
d540626c47 adjust another texinfo file so it does not leave entries behind.
rerun makesum while here.

from Moritz Grimm <mlist at scapa.dnsalias.net>

ok espie@
2007-02-22 00:17:09 +00:00
bernd
0435472660 Update to gnupg-1.4.6.
ok steven@
2007-01-16 09:50:36 +00:00
deanna
b750309ac5 Security fix:
remotely controllable function pointer [CVE-2006-6235]
from Werner Koch via fsf announce
ok steven
2006-12-06 23:11:58 +00:00
bernd
8ebe3474a5 Security fix for a buffer overflow when running gnupg in interactive mode.
More info:
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html
2006-11-28 10:18:49 +00:00
bernd
f557a7e653 Security update to gnupg-1.4.5. (CVE-2006-3746)
This fixes a denial of service vulnerability.

For more information see:
http://secunia.com/advisories/21297/
http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html

okay espie@
2006-08-07 19:59:20 +00:00
bernd
044eebec20 Update to gnupg-1.4.4.
ok reinhard@ (MAINTAINER), "looks good" steven@
2006-07-13 13:11:28 +00:00
bernd
2cfe636d68 Security update! Fixes an integer overflow. (CVE-2006-3082)
Detailed information: http://secunia.com/advisories/20783/

Diff from gnupg CVS.

ok sturm@
2006-06-23 11:35:36 +00:00
bernd
edebdd2694 - Update to gnupg-1.4.3
- Add ldap FLAVOR
- Describe the FLAVORs in pkg/DESCR

ok steven@
2006-04-12 09:55:24 +00:00
bernd
bcee2da2fc Since we have swap encryption on OpenBSD, only warn about insecure
memory if swap encryption is disabled. (It's enabled by default.)

This supersedes pkg/MESSAGE.

Regen patches with update-patches while I'm here. Bump PKGNAME.

idea and ok espie@
2006-02-06 21:57:56 +00:00
robert
57c713e689 SECURITY:
update to 1.4.1; fix a openpgp protocol vulnerability
http://www.vuxml.org/openbsd/be6057f4-9ecf-11d9-82a1-00065bd5b0b6.html
2005-03-27 15:16:07 +00:00
alek
ecdd8fbbd5 - Add bzip2 to dependency list (from Okan Demirmen <okan@demirmen.com>)
- Fix libintl/libiconv linking
- Don't include bundled libintl headers
- Update WANTLIB marker
- Bump PKGNAME

help & go ahead espie@
2005-02-19 12:10:03 +00:00
sturm
fa8985db98 update to GnuPG 1.4, new FLAVOR "card" to support usb card readers
initial version from Chris K. Young <cky at pobox.com>, adapted to
-current by Alec Berryman <alec at thened.net>

ok maintainer reinhard@
2005-01-29 19:27:18 +00:00
naddy
bd873807a9 remove workaround for gcc2.95/sparc64 optimizer bug: sha1.c compiles fine now 2004-02-24 19:48:16 +00:00
margarida
39cbe2af30 Security fix:
Add workaround for GnuPG's ElGamal signing keys bug.
URL: http://lists.gnupg.org/pipermail/gnupg-announce/2003q4/000276.html
2003-12-13 03:22:16 +00:00
brad
9f40457b1b run these tests as part of the regression target. 2003-06-09 17:24:47 +00:00
brad
2bbfff1f3a upgrade to gnupg 1.2.2
A bug was discovered in the key validation code.  This bug causes keys
with more than one user ID to give all user IDs on the key the amount
of validity given to the most-valid key.

http://marc.theaimsgroup.com/?l=bugtraq&m=105215110111174&w=2
--
MAINTAINER ok
2003-05-27 14:54:43 +00:00
pvalchev
826d00d2e7 adapt to new gas syntax for i386's switch to ELF 2003-04-17 08:24:03 +00:00
reinhard
10eeb924d6 no longer used idea flavour patches 2003-02-14 12:25:32 +00:00
pvalchev
de5a1ce02c cast NULL sentinel to void * so it is 64bit on alpha & sparc64 2002-12-28 23:29:13 +00:00
mark
e05b6552dc gnupg-1.2.1 update
tested on macppc, i386

ok reinhard@
2002-11-16 05:02:21 +00:00
drahn
2218d43562 powerpc does require pic flags when building shared library, do not remove
them during config. ok pvalchev@
2002-09-30 00:31:30 +00:00
naddy
1c61fd68ae Fix idea flavor: Revive patch to cipher/Makefile.am because configure
extracts the list of modules to build from there.  Sic.
2002-07-28 15:01:26 +00:00
fgsch
9ce3618d95 - use in tree gas, thus removing binutils dependency.
- move idea patches to patches directory.
- remove unneeded patch-cipher_Makefile_am.
- remove deprecated NEED_VERSION.

you need an updated gas for this to work on i386.
discussed with reinhard@.
2002-07-19 19:27:42 +00:00
reinhard
1a9bf6a6cb update to gnupg-1.0.7; thx Nikolay Sturm
* use 'as' of new binutils on non elf-toolchain archs

see http://lists.gnupg.org/pipermail/gnupg-announce/2002q2/000251.html
for a list of changes
2002-07-05 07:13:00 +00:00
lebel
33f764e47a Removed patch-g10_mainproc.c mostly because this patch was related to
the 1.0.4 release and because the problem was later fixed in 1.0.5 (and
later versions).  Here is a quote from the NEWS file about this issue:

--cut--
* WARNING: The semantics of --verify have changed to address a
problem with detached signature detection. --verify now ignores signed
material given on stdin unless this is requested by using a "-" as the
name for the file with the signed material.  Please check all your
detached signature handling applications and make sure that they don't
pipe the signed material to stdin without using a filename together with
"-" on the the command line.
--cut--

The patch introduce a problem in the way verifying a signature returned
a value of 2 instead of 0 (when the signature was properly verified).
The symptom showed itself in mutt for example.

This problem was found by Anders Arnholm <anders@arnholm.nu>

markus@ asked me to commit this.
2001-08-22 15:22:40 +00:00
pvalchev
db891178f7 correct asm-syntax for powerpc. pointed by drahn, ok markus 2001-08-09 16:48:35 +00:00
reinhard
9879992112 update to gnupg-1.0.6; SECURITY FIX
*) Fixed a format string bug which is exploitable if --batch is not used.
*) Checked all translations for format strings bugs.
*) Removed the Russian translation due to too many bugs.
*) Fixed keyserver access and expire time calculation.

ok maintainer
2001-06-05 09:19:05 +00:00
jakob
436c5ffef5 update to v1.0.5. ok markus@. 2001-05-23 15:28:49 +00:00
reinhard
36bdf033ff SECURITY UPDATE (Klima-Rosa attack)
patch from:
Florian Weimer <Florian.Weimer@RUS.UNI-STUTTGART.DE>
# http://cert.uni-stuttgart.de/files/fw/gnupg-klima-rosa.diff
# http://cert.uni-stuttgart.de/files/fw/gnupg-klima-rosa.diff.asc

It introduces additional consistency checks, as suggested by the
authors of the paper.  The checks are slightly different, but they
make the two additional attacks infeasible, I think.  In the future,
it might be a good idea to add a check the generated signature for
validity, this will detect bugs in the MPI implementation which could
result in a revealed secret key, too.


ok markus@
2001-03-23 13:10:20 +00:00
reinhard
f4aa1ff9a5 o) minor fix for one of the MASTER_SITES; Pete Fritchman <petef@databits.net>
o) use /dev/arandom; suggested by markus@
o) add idea FLAVOR; suggested by markus@
o) add another MASTER_SITE
o) bump NEED_VERSION
2001-03-03 17:17:28 +00:00
reinhard
5e2899097a Security update, from the original patch:
It has been pointed out that there is another bug in the signature
verification code of GnuPG.

         * This can easily lead to false positives *

All versions of GnuPG released before today are vulnerable!

To check a detached singature you normally do this:

  gpg --verify foo.sig foo.txt

The problem here is that someone may replace foo.sig with a standard
signature containing some arbitrary signed text and its signature,
and then modify foo.txt - GnuPG does not detect this - Ooops.

The solution for this problem ist not easy and needs a change in the
semantics of the --verify command: It will not any longer be
possible to do this:

  gpg --verify foo.sig <foo.txt

Instead you have to use this

  gpg --verify foo.sig - <foo.txt

The difference here is that gpg sees 2 files on the command lines
and thereby knows that it should check a detached signature.  We
really need this information and there is no way to avoid that
change, sorry.  You should make sure that you never use the first
form, because this will lead to false positives when foo.sig is not
a detached signature - gnupg does detect the other case and warns
you, but this is not sufficient.  If you use GnuPG from other
applications, please change it.

ok markus@
2000-12-23 15:20:59 +00:00
markus
07aae00303 security update, since 1.0.3 does not detect modifications of files with multiple signatures 2000-10-30 12:52:32 +00:00
brad
37e77d5814 upgrade to gnupg 0.9.10 1999-08-04 22:41:02 +00:00
brad
040cb584ca upgrade to GNUPG 0.9.9; -
Markus Friedl <markus.friedl@informatik.uni-erlangen.de>
1999-07-25 23:33:41 +00:00
brad
001ae99fd7 upgrade to GnuPG 0.9.7 1999-05-24 20:55:44 +00:00
brad
8b5d32c736 upgrade to GnuPG 0.9.6 1999-05-08 17:38:40 +00:00
brad
4a7daafbb4 add gnupg port; markus.friedl@informatik.uni-erlangen.de
-
GNU privacy guard - a free PGP replacement.
1999-04-23 03:16:05 +00:00