FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

I am looking for an LTO tape library. Do you have one to spare?
Port details
gnupg1 The GNU Privacy Guard
1.4.18_2 security on this many watch lists=27 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Maintainer: kuriyama@FreeBSD.org search for ports maintained by this maintainer
Port Added: 09 Dec 2006 08:37:20
License: not specified in port
GnuPG is a complete and free replacement for PGP.

Because it does not use the patented IDEA algorithm, it can be used
without any restrictions.  GnuPG is an RFC2440 (OpenPGP) compliant
application.

WWW: http://www.gnupg.org/

kuriyama@FreeBSD.org
SVNWeb : Homepage : Distfiles Availability : PortsMon

NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Build dependencies:
  1. gmake : devel/gmake
Runtime dependencies:
  1. indexinfo : print/indexinfo
Library dependencies:
  1. libcurl.so : ftp/curl
  2. libintl.so : devel/gettext

This port is required by:

for Build for Run * - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...

To install the port: cd /usr/ports/security/gnupg1/ && make install clean
To add the package: pkg install security/gnupg1


Configuration Options
===> The following configuration options are available for gnupg1-1.4.18_2:
     CURL=on: use libcurl for the keyserver interface
     DOCS=on: Build and/or install documentation
     LDAP=off: LDAP keyserver interface
     LIBICONV=off: use libiconv
     LIBUSB=off: use libusb
     NLS=on: Native Language Support
     SUID_GPG=off: install GPG with suid
===> Use 'make config' to modify these settings

Master Sites:
  1. ftp://ftp.crysys.hu/pub/gnupg/gnupg/
  2. ftp://ftp.franken.de/pub/crypt/mirror/ftp.gnupg.org/gcrypt/gnupg/
  3. ftp://ftp.freenet.de/pub/ftp.gnupg.org/gcrypt/gnupg/
  4. ftp://ftp.gnupg.org/gcrypt/gnupg/
  5. ftp://ftp.hi.is/pub/mirrors/gnupg/gnupg/
  6. ftp://ftp.mirrorservice.org/sites/ftp.gnupg.org/gcrypt/gnupg/
  7. ftp://ftp.sunet.se/pub/security/gnupg/gnupg/
  8. ftp://mirror.cict.fr/gnupg/gnupg/
  9. ftp://mirror.switch.ch/mirror/gnupg/gnupg/
  10. http://artfiles.org/gnupg.org/gnupg/
  11. http://distcache.FreeBSD.org/ports-distfiles/
  12. http://dotsrc.org/gnupg/
  13. http://ftp.heanet.ie/mirrors/ftp.gnupg.org/gcrypt/gnupg/
  14. http://mirror.tje.me.uk/pub/mirrors/ftp.gnupg.org/gnupg/
  15. http://www.mirrorservice.org/sites/ftp.gnupg.org/gcrypt/gnupg/
Port Moves
  • port moved here from security/gnupg-idea on 2013-04-26
    REASON: Modules now included in gnupg 1.4.13

Number of commits found: 46

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
27 Nov 2014 13:54:07
Original commit files touched by this commit  1.4.18_2
Revision:373488
bapt search for other commits by this committer
Do not install gnupg(7) manpage to allow installing in parallel of regular gnupg
People using spamassing can now still use it while having anything else using
newer gnupg

With hat:	portmgr
13 Nov 2014 09:02:57
Original commit files touched by this commit  1.4.18_1
Revision:372514
antoine search for other commits by this committer
Cleanup plist
24 Jul 2014 18:34:16
Original commit files touched by this commit  1.4.18_1
Revision:362835
tijl search for other commits by this committer
net/openldap24-*:
- Convert to USES=libtool and bump dependent ports
- Avoid USE_AUTOTOOLS
- Don't use PTHREAD_LIBS
- Use MAKE_CMD

databases/glom:
- Drop :keepla
- Add INSTALL_TARGET=install-strip

databases/libgda4* databases/libgda5*:
- Convert to USES=libtool and bump dependent ports
- USES=tar:xz
- Use INSTALL_TARGET=install-strip
- Use @sample
(Only the first 15 lines of the commit message are shown above View all of this commit message)
30 Jun 2014 22:45:18
Original commit files touched by this commit  1.4.18
Revision:359937
kuriyama search for other commits by this committer
- Upgrade to 1.4.18 (bugfix).
23 Jun 2014 23:09:06
Original commit files touched by this commit  1.4.17
Revision:359019
kuriyama search for other commits by this committer
- Upgrade to 1.4.17 (security fix).

This release includes a *security fix* to stop a possible DoS
using garbled compressed data packets which can be used to
put gpg into an infinite loop.

References:	http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html
29 May 2014 14:53:47
Original commit files touched by this commit  1.4.16_2
Revision:355706 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Fix fatal error at exit regarding missing trustdb although key is imported.

Submitted by:	des, philip
References:	https://bugs.gnupg.org/gnupg/issue1622
References:	http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=23191d7851eae2217ecdac6484349849a24fd94a
25 Mar 2014 12:15:54
Original commit files touched by this commit  1.4.16_1
Revision:349132 This port version is marked as vulnerable.
madpilot search for other commits by this committer
Bump PORTREVISION, forgotten in previous commit.

Noticed by:	mat
25 Mar 2014 07:24:42
Original commit files touched by this commit  1.4.16
Revision:349108 This port version is marked as vulnerable.
madpilot search for other commits by this committer
- Really disable iconv support when LIBICONV option is not selected [1]
  This fixes build on 10 and head when libiconv is installed and
  LIBICONV option is disabled

While here:

- Convert to USES gmake and USES tar [2]
- Convert to new LIB_DEPENDS format [2]

Reported by:	Mike Harding <mvharding@gmail.com> (via email)
Approved by:	portmgr (bapt, implicit) [1]
Approved by:	implicit portmgr@ blanket approval [2]
05 Feb 2014 13:58:42
Original commit files touched by this commit  1.4.16
Revision:342704 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Stage support
18 Dec 2013 15:14:56
Original commit files touched by this commit  1.4.16
Revision:336839 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.16 (security fix).

References: http://lists.gnupg.org/pipermail/gnupg-announce/2013q4/000337.html
05 Dec 2013 11:19:00
Original commit files touched by this commit  1.4.15
Revision:335659 This port version is marked as vulnerable.
mat search for other commits by this committer
Fixup pkgname.

PR:		ports/184444
Submitted by:	mat
Approved by:	portmgr (bapt)
05 Oct 2013 15:41:25
Original commit files touched by this commit  1.4.15
Revision:329469 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Revert NO_STAGE because packaging failure with PKGNG.
05 Oct 2013 09:35:03
Original commit files touched by this commit  1.4.15
Revision:329430 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.15 (security, VuXML entry will follow).
- Use $STAGEDIR.
20 Sep 2013 22:55:26
Original commit files touched by this commit  1.4.14
Revision:327769 This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
security)
25 Jul 2013 13:12:27
Original commit files touched by this commit  1.4.14
Revision:323640 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.14.

Security: http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html

I'll write vuxml entry later.
11 Jul 2013 16:26:27
Original commit files touched by this commit  1.4.13_1
Revision:322783 This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Update to 7.31.0
- Bump PORTREVISION for ftp/curl shlib change
- Add TEST_DEPENDS
- Convert to new options framework
- Adjust options:
  - Add COOKIES
  - Add CYASSL, NSS, POLARSSL, THREADED_RESOLVER, TLS_SRP [1]
  - Add GSSAPI and SPNEGO [2]
  - Remove KERBEROS4
  - Rename LIBIDN to IDN
  - Remove TRACKMEMORY [1]
- Sort option handler
- Add SLAVEDIRS: ftp/curl-hiphop
- Cosmetic change
- Cleanup Makefile header
- While I'm here, fix typo (PORTREVSION) in x11-wm/ede/Makefile

Changes:	http://curl.haxx.se/changes.html
PR:		ports/172325 (-exp run), ports/177369 (based on) [1]
Submitted by:	Hirohisa Yamaguchi <umq@ueo.co.jp> [1], hrs (via email) [2]
Exp run by:	miwi
30 Apr 2013 06:28:27
Original commit files touched by this commit  1.4.13
Revision:316883 This port version is marked as vulnerable.
jgh search for other commits by this committer
- convert ports to USES= gettext

Approved by:	portmgr (bapt@)
28 Apr 2013 21:02:40
Refresh Original commit files touched by this commit
Revision:316749  Sanity Test Failure
bapt search for other commits by this committer
Convert security to new options framework
27 Apr 2013 18:25:25
Original commit files touched by this commit  1.4.13
Revision:316683 This port version is marked as vulnerable.
mva search for other commits by this committer
- Convert USE_ICONV=yes to USES=iconv
- Change USE_GNOME=pkgconfig|gnomehack to USES=pathfix|pkgconfig and
  USE_GETTEXT=yes to USES=gettext while here
18 Mar 2013 11:40:04
Original commit files touched by this commit  1.4.13
Revision:314556 This port version is marked as vulnerable.
bapt search for other commits by this committer
Fix a long standing bug of lib/charset.alias being overwritten, modified, and
badly tracked by ports.

Make lib/charset.alias a file only provided by converters/libiconv
Create a new USES: charsetfix, that will modify in post patch the Makefile.in to
prevent a port from modifying/overwritting the charset.alias file during make
install.
Prevent devel/gettext from installing that files.
Fix a couple of ports that actually touch charset.alias during the build phase.

Based on a patch by ale
(http://lists.freebsd.org/pipermail/freebsd-gnome/2012-October/027747.html)

Approved by:	kwm (gnome)
Exp-run by:	miwi
27 Dec 2012 13:57:57
Original commit files touched by this commit  1.4.13
Revision:309541 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix build on more recent current.

PR:		ports/173678
Submitted by:	swills
21 Dec 2012 00:42:25
Original commit files touched by this commit  1.4.13
Revision:309335 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.13 (minor bugfixes).
31 Jan 2012 00:56:24
Original commit files touched by this commit  1.4.12
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.14.12 (minor bugfixes).
29 Jan 2012 14:44:06
Original commit files touched by this commit  1.4.11
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix build on 10-current (i386) [1]
- Fix build with clang by using CFLAGS+=-std=c89.

PR:             ports/163898 [1]
Submitted by:   swills [1]
09 Nov 2011 15:26:04
Original commit files touched by this commit  1.4.11
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Remove WITH_FBSD10_FIX, is no longer needed
29 Oct 2011 10:03:08
Original commit files touched by this commit  1.4.11
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Fix build on FreeBSD 10

Reported by:    pointyhat
03 Jul 2011 14:03:52
Original commit files touched by this commit  1.4.11
 This port version is marked as vulnerable.
ohauer search for other commits by this committer
-remove MD5
19 Oct 2010 00:36:14
Original commit files touched by this commit  1.4.11
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.11 (minor bugfixes).

References:    
http://lists.gnupg.org/pipermail/gnupg-announce/2010q4/000303.html
02 Jun 2010 01:56:47
Original commit files touched by this commit  1.4.10_2
 This port version is marked as vulnerable.
linimon search for other commits by this committer
Attempt to fix build on powerpc.

Hat:            portmgr
31 May 2010 02:01:56
Original commit files touched by this commit  1.4.10_2
 This port version is marked as vulnerable.
ade search for other commits by this committer
Bounce PORTREVISION for gettext-related ports.  Have fun, ya'll.
03 Apr 2010 10:44:36
Original commit files touched by this commit  1.4.10_1
 This port version is marked as vulnerable.
roam search for other commits by this committer
Chase the ftp/curl shlib version bump.
04 Sep 2009 10:06:46
Original commit files touched by this commit  1.4.10
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.10.
09 Mar 2009 17:15:43
Original commit files touched by this commit  1.4.9_2
  Sanity Test Failure This port version is marked as vulnerable.
stas search for other commits by this committer
- Chase libusb20 rename in r189585.
- Mark sane-backends broken on current due to changes
  in USB stack.

Reviewed by:    thompsa (old version), miwi
Tested by:      miwi
23 Jan 2009 15:43:14
Original commit files touched by this commit  1.4.9_2
 This port version is marked as vulnerable.
roam search for other commits by this committer
Bump the version of the curl shared library after the ftp/curl update
to 7.19.2.
Bump PORTREVISION, even on the ports that do not have a versioned
dependency, since the binaries will most probably still stop working.
06 Jan 2009 17:59:31
Original commit files touched by this commit  1.4.9_1
 This port version is marked as vulnerable.
pav search for other commits by this committer
- Remove conditional checks for FreeBSD 5.x and older
21 Aug 2008 06:18:49
Original commit files touched by this commit  1.4.9_1
 This port version is marked as vulnerable.
rafan search for other commits by this committer
Update CONFIGURE_ARGS for how we pass CONFIGURE_TARGET to configure script.
Specifically, newer autoconf (> 2.13) has different semantic of the
configure target. In short, one should use --build=CONFIGURE_TARGET
instead of CONFIGURE_TARGET directly. Otherwise, you will get a warning
and the old semantic may be removed in later autoconf releases.

To workaround this issue, many ports hack the CONFIGURE_TARGET variable
so that it contains the ``--build='' prefix.

To solve this issue, under the fact that some ports still have
configure script generated by the old autoconf, we use runtime detection
in the do-configure target so that the proper argument can be used.

Changes to Mk/*:
 - Add runtime detection magic in bsd.port.mk
(Only the first 15 lines of the commit message are shown above View all of this commit message)
11 Aug 2008 12:27:53
Original commit files touched by this commit  1.4.9_1
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Fix plist with NOPORTDOCS.

Reported by:    QA Tindy (itetcu)
06 Jun 2008 14:01:07
Original commit files touched by this commit  1.4.9_1
 This port version is marked as vulnerable.
edwin search for other commits by this committer
Bump portrevision due to upgrade of devel/gettext.

The affected ports are the ones with gettext as a run-dependency
according to ports/INDEX-7 (5007 of them) and the ones with USE_GETTEXT
in Makefile (29 of them).

PR:             ports/124340
Submitted by:   edwin@
Approved by:    portmgr (pav)
26 Apr 2008 23:51:41
Original commit files touched by this commit  1.4.9
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 1.4.9

Notes:
        This update fixes a possible security vulnerability
        involving memory corruption from importing malicious
        keys.

PR:             122349 / 122155
Submitted by:   Nick Barkas <snb@threerings.net> / Hirohisa Yamaguchi
<umq@ueo.co.jp>
Approved by:    maintainer timeout
Security:      
http://www.vuxml.org/freebsd/30394651-13e1-11dd-bab7-0016179b2dd5.html
12 Jan 2008 08:53:44
Original commit files touched by this commit  1.4.8
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.8 (GPL3).

PR:             ports/118894
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp>
04 Oct 2007 06:00:24
Original commit files touched by this commit  1.4.7_1
 This port version is marked as vulnerable.
edwin search for other commits by this committer
Remove always-false/true conditions based on OSVERSION 500000
23 Jul 2007 09:36:52
Original commit files touched by this commit  1.4.7_1
 This port version is marked as vulnerable.
rafan search for other commits by this committer
- Set --mandir and --infodir in CONFIGURE_ARGS if the configure script
  supports them.  This is determined by running ``configure --help'' in
  do-configure target and set the shell variable _LATE_CONFIGURE_ARGS
  which is then passed to CONFIGURE_ARGS.
- Remove --mandir and --infodir in ports' Makefile where applicable
  Few ports use REINPLACE_CMD to achieve the same effect, remove them too.
- Correct some manual pages location from PREFIX/man to MANPREFIX/man
- Define INFO_PATH where necessary
- Document that .info files are installed in a subdirectory relative to
  PREFIX/INFO_PATH and slightly change add-plist-info to use INFO_PATH and
  subdirectory detection.

PR:             ports/111470
Approved by:    portmgr
Discussed with: stas (Mk/*), gerald (info related stuffs)
Tested by:      pointyhat exp run
19 May 2007 20:32:57
Original commit files touched by this commit  1.4.7_1
 This port version is marked as vulnerable.
flz search for other commits by this committer
- Welcome X.org 7.2 \o/.
- Set X11BASE to ${LOCALBASE} for recent ${OSVERSION}.
- Bump PORTREVISION for ports intalling files in ${X11BASE}.
06 Mar 2007 09:06:19
Original commit files touched by this commit  1.4.7
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.7.
  Add safety seatbelt for inserting additional text in signed OpenPGP message.

References:    
http://lists.gnupg.org/pipermail/gnupg-devel/2007-March/023687.html,
               
http://lists.gnupg.org/pipermail/gnupg-devel/2007-March/023686.html
25 Dec 2006 03:49:00
Original commit files touched by this commit  1.4.6_3
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- I forgot to bump PORTREVISION to sync with security/gnupg as of
  before 2.0 upgrade.
- Add a patch to fix info/dir entry in gnupg1.info [1].
- Recover symlink during removing this port after installing
  security/gnupg (2.0) (I forgot to add this before...).

PR:             ports/106819 [1]
Submitted by:   Dmitry A Grigorovich <odip@bionet.nsc.ru>
09 Dec 2006 08:36:48
Original commit files touched by this commit  1.4.6
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Chase security/gnupg upgrade (but still 1.4.6) after repocopy.
  (not connected in ../Makefile)
- Tweak installation directory for documents to avoid conflict against
  coming gnupg upgrade (2.0.1).

I'm still testing my patch to upgrade to 2.0.1, so please wait. :-)

Number of commits found: 46

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
muttDec 23
muttDec 23
ntpDec 20
ntp-develDec 20
gitDec 19
otrsDec 16
mod_dav_svnDec 15
subversionDec 15
subversion16Dec 15
subversion17Dec 15
nvidia-driverDec 14
nvidia-driver-173Dec 14
nvidia-driver-304Dec 14
asterisk11Dec 11
bind99Dec 11

10 vulnerabilities affecting 28 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24433
Broken 149
Deprecated 74
Ignore 400
Forbidden 2
Restricted 207
No CDROM 93
Vulnerable 20
Expired 0
Set to expire 69
Interactive 0
new 24 hours 1
new 48 hours3
new 7 days17
new fortnight42
new month99

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.