Subject: CVS commit: pkgsrc/security/gnupg
From: Lubomir Sedlacik
Date: 2006-06-24 16:20:29
Message id: 20060624142029.97A54211CA@cvs.netbsd.org

Log Message:
Security fix for CVE-2006-3082:

"parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions,
 allows remote attackers to cause a denial of service (gpg crash) and
 possibly overwrite memory via a message packet with a large length,
 which could lead to an integer overflow, as demonstrated using the
 --no-armor option."

Patch from GnuPG CVS repository.
Bump PKGREVISION.

Files:
RevisionActionfile
1.86modifypkgsrc/security/gnupg/Makefile
1.40modifypkgsrc/security/gnupg/distinfo
1.1addpkgsrc/security/gnupg/patches/patch-ba