FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Port details
gnupg1 The GNU Privacy Guard (minimalist "classic" version)
1.4.22 security on this many watch lists=32 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Maintainer: adamw@FreeBSD.org search for ports maintained by this maintainer
Port Added: 09 Dec 2006 08:37:20
License: GPLv3+
GnuPG is a complete and free replacement for PGP. This is the "classic"
version, which doesn't support newer algorithms, but also has very
few dependencies. Use security/gnupg unless you're sure you want thisone.

GnuPG allows encrypting and signing your data and communication, and
features a versatile key management system as well as access modules
for many public key directories. GnuPG, also known as GPG, is a command
line tool with features for easy integration with other applications.

WWW: https://www.gnupg.org/
SVNWeb : Homepage : PortsMon : pkg-plist

To install the port: cd /usr/ports/security/gnupg1/ && make install clean
To add the package: pkg install gnupg1

PKGNAME: gnupg1

distinfo:

TIMESTAMP = 1500553130
SHA256 (gnupg-1.4.22.tar.bz2) = 9594a24bec63a21568424242e3f198b9d9828dea5ff0c335e47b06f835f930b4
SIZE (gnupg-1.4.22.tar.bz2) = 3746546


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Build dependencies:
  1. gmake : devel/gmake
  2. msgfmt : devel/gettext-tools
Runtime dependencies:
  1. indexinfo : print/indexinfo
Library dependencies:
  1. libcurl.so : ftp/curl
  2. libintl.so : devel/gettext-runtime

This port is required by:

for Build for Run * - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...
Configuration Options
===> The following configuration options are available for gnupg1-1.4.22:
     CURL=on: Use libcurl for the keyserver interface
     DOCS=on: Build and/or install documentation
     ICONV=off: Encoding conversion support via iconv
     LDAP=off: LDAP keyserver interface
     LIBUSB=off: Support for USB smart cards
     NLS=on: Native Language Support
     SUID_GPG=off: Install GPG setuid
===> Use 'make config' to modify these settings

USES:
charsetfix compiler cpe gmake readline tar:bzip2 gettext

Master Sites:
  1. ftp://ftp.crysys.hu/pub/gnupg/gnupg/
  2. ftp://ftp.franken.de/pub/crypt/mirror/ftp.gnupg.org/gcrypt/gnupg/
  3. ftp://ftp.freenet.de/pub/ftp.gnupg.org/gcrypt/gnupg/
  4. ftp://ftp.gnupg.org/gcrypt/gnupg/
  5. ftp://ftp.sunet.se/pub/security/gnupg/gnupg/
  6. ftp://mirror.switch.ch/mirror/gnupg/gnupg/
  7. http://artfiles.org/gnupg.org/gnupg/
  8. http://ftp.heanet.ie/mirrors/ftp.gnupg.org/gcrypt/gnupg/
  9. http://gd.tuwien.ac.at/privacy/gnupg/gnupg/
  10. http://mirror.tje.me.uk/pub/mirrors/ftp.gnupg.org/gnupg/
  11. http://mirrors.dotsrc.org/gcrypt/gnupg/
  12. http://www.mirrorservice.org/sites/ftp.gnupg.org/gcrypt/gnupg/
  13. https://gnupg.org/ftp/gcrypt/gnupg/
Port Moves
  • port moved here from security/gnupg-idea on 2013-04-26
    REASON: Modules now included in GnuPG 1.4.13

Number of commits found: 65

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
20 Jul 2017 12:20:18
Original commit files touched by this commit  1.4.22
Revision:446260
adamw search for other commits by this committer
Update to 1.4.22.

MFH:		2017Q3
Security:	CVE-2017-7526
27 Jun 2017 13:46:53
Original commit files touched by this commit  1.4.21_4
Revision:444463
sunpoet search for other commits by this committer
Update devel/readline to 7.0 patch 3

- Bump PORTREVISION for shlib change

Changes:	https://cnswww.cns.cwru.edu/php/chet/readline/CHANGES
		https://lists.gnu.org/archive/html/bug-bash/2016-09/msg00107.html
		https://lists.gnu.org/archive/html/bug-readline/2017-01/msg00002.html
Differential Revision:	https://reviews.freebsd.org/D11172
PR:		219947
Exp-run by:	antoine
10 Jan 2017 15:42:12
Original commit files touched by this commit  1.4.21_3
Revision:431096
tijl search for other commits by this committer
Restore the link from gpg to gpg2 on uninstallation, removed in r431058.

When gnupg is installed, installing gnupg1 overwrites the link.  Uninstall
should restore the link so the system is back in the same state.

Approved by:	adamw (maintainer)
10 Jan 2017 02:48:53
Original commit files touched by this commit  1.4.21_2
Revision:431058
adamw search for other commits by this committer
Standardize the COMMENT and pkg-descr with the other gnupg ports.

Readline for everyone instead of it sometimes showing up and never
being recorded.

Don't link gpg to gpg2 on uninstallation. This is not a good idea.
The gnupg{,20} ports handle creating that symlink.

Remove the .sig file from distinfo.

PORTREVISION bump for the dependency and plist changes.
31 Oct 2016 21:09:02
Original commit files touched by this commit  1.4.21_1
Revision:425027
adamw search for other commits by this committer
Oops.

Notified by:	pi
31 Oct 2016 16:24:59
Original commit files touched by this commit  1.4.21_1
Revision:425012
adamw search for other commits by this committer
Improve the compiler check by using USES=compiler and not applying
it blindly to 10+.

PR:		213932
Reported by:	dewayne heuristicsystems com au
30 Oct 2016 23:23:23
Original commit files touched by this commit  1.4.21_1
Revision:424966
adamw search for other commits by this committer
Enable the CAMELLIA cipher and noexecstack (support for which gets
auto-detected). While here, fix a few Makefile nits and provide a
better COMMENT.
30 Oct 2016 21:20:29
Original commit files touched by this commit  1.4.21
Revision:424964
adamw search for other commits by this committer
A number of simplifications and improvements.

- Don't download the unusued signature
- Use the standard ICONV knob instead of LIBICONV
- Improve option descriptions and proper capitalization
- Handle the SUID chmod in the plist instead of the Makefile
- Simplify CFLAGS modification and skip the unnecessary -std=c89 addition
- Don't patch docs installation out, just let pkg DTRT
- Switch WWW to https

No PORTREVISION bump because most of these changes are NOOPs, except
the WWW change which isn't worth forcing a rebuild for.
17 Sep 2016 15:58:50
Original commit files touched by this commit  1.4.21
Revision:422332
adamw search for other commits by this committer
Complete the adoption of options helpers, remove old cruft,
and take maintainership.

PR:		212352
Approved by:	maintainer timeout
08 Sep 2016 17:04:12
Original commit files touched by this commit  1.4.21
Revision:421567
amdmi3 search for other commits by this committer
- Add LICENSE
- While here, convert to options helpers and new test framework

PR:		207449
Submitted by:	dewayne@heuristicsystems.com.au
Approved by:	maintainer timeout (kuriyama, 6 months)
18 Aug 2016 00:20:00
Original commit files touched by this commit  1.4.21
Revision:420375
kuriyama search for other commits by this committer
- Upgrade to 1.4.21 (security, predictable bits in some situation).

References: https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
17 Jun 2016 23:28:05
Original commit files touched by this commit  1.4.20
Revision:417041 This port version is marked as vulnerable.
mat search for other commits by this committer
Rename all files containing a : in their filename.

While there, run make makepatch on affected ports, and rename patches
accordingly.

Sponsored by:	Absolight
01 Apr 2016 14:25:18
Original commit files touched by this commit  1.4.20
Revision:412349 This port version is marked as vulnerable.
mat search for other commits by this committer
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.

With hat:	portmgr
Sponsored by:	Absolight
24 Dec 2015 17:27:47
Original commit files touched by this commit  1.4.20
Revision:404380 This port version is marked as vulnerable.
adamw search for other commits by this committer
Fix signature. The signature cannot have been correct; it was 50% the size of
all other signatures.
23 Dec 2015 03:25:52
Original commit files touched by this commit  1.4.20
Revision:404276 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.20 (minor fixes).
27 Nov 2015 17:52:56
Original commit files touched by this commit  1.4.19
Revision:402488 This port version is marked as vulnerable.
mmoll search for other commits by this committer
security/gnupg1: fix build on arm

PR:		197793
Submitted by:	Mikael Urankar <mikael.urankar@gmail.com>
Approved by:	kuriyama (maintainer, timeout)
14 May 2015 10:15:09
Original commit files touched by this commit  1.4.19
Revision:386312 This port version is marked as vulnerable.
mat search for other commits by this committer
MASTER_SITES cleanup.

- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
  of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
  no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.

While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.

Also, replace some EXTRACT_SUFX occurences with USES=tar:*.

Checked by:	make fetch-urlall-list
With hat:	portmgr
Sponsored by:	Absolight
14 Apr 2015 08:24:07
Original commit files touched by this commit  1.4.19
Revision:383984 This port version is marked as vulnerable.
robak search for other commits by this committer
security/gnupg1: add CPE information

- Maintainer's timeout (kuriyama@FreeBSD.org)

PR:		198850
Submitted by:	Shun <shun.fbsd.pr@dropcut.net>
28 Feb 2015 14:55:08
Original commit files touched by this commit  1.4.19
Revision:380145 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.19 (with SCA fix).
27 Nov 2014 13:54:07
Original commit files touched by this commit  1.4.18_2
Revision:373488 This port version is marked as vulnerable.
bapt search for other commits by this committer
Do not install gnupg(7) manpage to allow installing in parallel of regular gnupg
People using spamassing can now still use it while having anything else using
newer gnupg

With hat:	portmgr
13 Nov 2014 09:02:57
Original commit files touched by this commit  1.4.18_1
Revision:372514 This port version is marked as vulnerable.
antoine search for other commits by this committer
Cleanup plist
24 Jul 2014 18:34:16
Original commit files touched by this commit  1.4.18_1
Revision:362835 This port version is marked as vulnerable.
tijl search for other commits by this committer
net/openldap24-*:
- Convert to USES=libtool and bump dependent ports
- Avoid USE_AUTOTOOLS
- Don't use PTHREAD_LIBS
- Use MAKE_CMD

databases/glom:
- Drop :keepla
- Add INSTALL_TARGET=install-strip

databases/libgda4* databases/libgda5*:
- Convert to USES=libtool and bump dependent ports
- USES=tar:xz
- Use INSTALL_TARGET=install-strip
- Use @sample
(Only the first 15 lines of the commit message are shown above View all of this commit message)
30 Jun 2014 22:45:18
Original commit files touched by this commit  1.4.18
Revision:359937 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.18 (bugfix).
23 Jun 2014 23:09:06
Original commit files touched by this commit  1.4.17
Revision:359019 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.17 (security fix).

This release includes a *security fix* to stop a possible DoS
using garbled compressed data packets which can be used to
put gpg into an infinite loop.

References:	http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html
29 May 2014 14:53:47
Original commit files touched by this commit  1.4.16_2
Revision:355706 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Fix fatal error at exit regarding missing trustdb although key is imported.

Submitted by:	des, philip
References:	https://bugs.gnupg.org/gnupg/issue1622
References:	http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=23191d7851eae2217ecdac6484349849a24fd94a
25 Mar 2014 12:15:54
Original commit files touched by this commit  1.4.16_1
Revision:349132 This port version is marked as vulnerable.
madpilot search for other commits by this committer
Bump PORTREVISION, forgotten in previous commit.

Noticed by:	mat
25 Mar 2014 07:24:42
Original commit files touched by this commit  1.4.16
Revision:349108 This port version is marked as vulnerable.
madpilot search for other commits by this committer
- Really disable iconv support when LIBICONV option is not selected [1]
  This fixes build on 10 and head when libiconv is installed and
  LIBICONV option is disabled

While here:

- Convert to USES gmake and USES tar [2]
- Convert to new LIB_DEPENDS format [2]

Reported by:	Mike Harding <mvharding@gmail.com> (via email)
Approved by:	portmgr (bapt, implicit) [1]
Approved by:	implicit portmgr@ blanket approval [2]
05 Feb 2014 13:58:42
Original commit files touched by this commit  1.4.16
Revision:342704 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Stage support
18 Dec 2013 15:14:56
Original commit files touched by this commit  1.4.16
Revision:336839 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.16 (security fix).

References: http://lists.gnupg.org/pipermail/gnupg-announce/2013q4/000337.html
05 Dec 2013 11:19:00
Original commit files touched by this commit  1.4.15
Revision:335659 This port version is marked as vulnerable.
mat search for other commits by this committer
Fixup pkgname.

PR:		ports/184444
Submitted by:	mat
Approved by:	portmgr (bapt)
05 Oct 2013 15:41:25
Original commit files touched by this commit  1.4.15
Revision:329469 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Revert NO_STAGE because packaging failure with PKGNG.
05 Oct 2013 09:35:03
Original commit files touched by this commit  1.4.15
Revision:329430 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.15 (security, VuXML entry will follow).
- Use $STAGEDIR.
20 Sep 2013 22:55:26
Original commit files touched by this commit  1.4.14
Revision:327769 This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
security)
25 Jul 2013 13:12:27
Original commit files touched by this commit  1.4.14
Revision:323640 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.14.

Security: http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html

I'll write vuxml entry later.
11 Jul 2013 16:26:27
Original commit files touched by this commit  1.4.13_1
Revision:322783 This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Update to 7.31.0
- Bump PORTREVISION for ftp/curl shlib change
- Add TEST_DEPENDS
- Convert to new options framework
- Adjust options:
  - Add COOKIES
  - Add CYASSL, NSS, POLARSSL, THREADED_RESOLVER, TLS_SRP [1]
  - Add GSSAPI and SPNEGO [2]
  - Remove KERBEROS4
  - Rename LIBIDN to IDN
  - Remove TRACKMEMORY [1]
- Sort option handler
- Add SLAVEDIRS: ftp/curl-hiphop
- Cosmetic change
- Cleanup Makefile header
- While I'm here, fix typo (PORTREVSION) in x11-wm/ede/Makefile

Changes:	http://curl.haxx.se/changes.html
PR:		ports/172325 (-exp run), ports/177369 (based on) [1]
Submitted by:	Hirohisa Yamaguchi <umq@ueo.co.jp> [1], hrs (via email) [2]
Exp run by:	miwi
30 Apr 2013 06:28:27
Original commit files touched by this commit  1.4.13
Revision:316883 This port version is marked as vulnerable.
jgh search for other commits by this committer
- convert ports to USES= gettext

Approved by:	portmgr (bapt@)
28 Apr 2013 21:02:40
Original commit files touched by this commit  1.4.13
Revision:316749  Sanity Test Failure This port version is marked as vulnerable.
bapt search for other commits by this committer
Convert security to new options framework
27 Apr 2013 18:25:25
Original commit files touched by this commit  1.4.13
Revision:316683 This port version is marked as vulnerable.
mva search for other commits by this committer
- Convert USE_ICONV=yes to USES=iconv
- Change USE_GNOME=pkgconfig|gnomehack to USES=pathfix|pkgconfig and
  USE_GETTEXT=yes to USES=gettext while here
18 Mar 2013 11:40:04
Original commit files touched by this commit  1.4.13
Revision:314556 This port version is marked as vulnerable.
bapt search for other commits by this committer
Fix a long standing bug of lib/charset.alias being overwritten, modified, and
badly tracked by ports.

Make lib/charset.alias a file only provided by converters/libiconv
Create a new USES: charsetfix, that will modify in post patch the Makefile.in to
prevent a port from modifying/overwritting the charset.alias file during make
install.
Prevent devel/gettext from installing that files.
Fix a couple of ports that actually touch charset.alias during the build phase.

Based on a patch by ale
(http://lists.freebsd.org/pipermail/freebsd-gnome/2012-October/027747.html)

Approved by:	kwm (gnome)
Exp-run by:	miwi
27 Dec 2012 13:57:57
Original commit files touched by this commit  1.4.13
Revision:309541 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix build on more recent current.

PR:		ports/173678
Submitted by:	swills
21 Dec 2012 00:42:25
Original commit files touched by this commit  1.4.13
Revision:309335 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.13 (minor bugfixes).
31 Jan 2012 00:56:24
Original commit files touched by this commit  1.4.12
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.14.12 (minor bugfixes).
29 Jan 2012 14:44:06
Original commit files touched by this commit  1.4.11
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix build on 10-current (i386) [1]
- Fix build with clang by using CFLAGS+=-std=c89.

PR:             ports/163898 [1]
Submitted by:   swills [1]
09 Nov 2011 15:26:04
Original commit files touched by this commit  1.4.11
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Remove WITH_FBSD10_FIX, is no longer needed
29 Oct 2011 10:03:08
Original commit files touched by this commit  1.4.11
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Fix build on FreeBSD 10

Reported by:    pointyhat
03 Jul 2011 14:03:52
Original commit files touched by this commit  1.4.11
 This port version is marked as vulnerable.
ohauer search for other commits by this committer
-remove MD5
19 Oct 2010 00:36:14
Original commit files touched by this commit  1.4.11
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.11 (minor bugfixes).

References:    
http://lists.gnupg.org/pipermail/gnupg-announce/2010q4/000303.html
02 Jun 2010 01:56:47
Original commit files touched by this commit  1.4.10_2
 This port version is marked as vulnerable.
linimon search for other commits by this committer
Attempt to fix build on powerpc.

Hat:            portmgr
31 May 2010 02:01:56
Original commit files touched by this commit  1.4.10_2
 This port version is marked as vulnerable.
ade search for other commits by this committer
Bounce PORTREVISION for gettext-related ports.  Have fun, ya'll.
03 Apr 2010 10:44:36
Original commit files touched by this commit  1.4.10_1
 This port version is marked as vulnerable.
roam search for other commits by this committer
Chase the ftp/curl shlib version bump.
04 Sep 2009 10:06:46
Original commit files touched by this commit  1.4.10
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.10.
09 Mar 2009 17:15:43
Original commit files touched by this commit  1.4.9_2
  Sanity Test Failure This port version is marked as vulnerable.
stas search for other commits by this committer
- Chase libusb20 rename in r189585.
- Mark sane-backends broken on current due to changes
  in USB stack.

Reviewed by:    thompsa (old version), miwi
Tested by:      miwi
23 Jan 2009 15:43:14
Original commit files touched by this commit  1.4.9_2
 This port version is marked as vulnerable.
roam search for other commits by this committer
Bump the version of the curl shared library after the ftp/curl update
to 7.19.2.
Bump PORTREVISION, even on the ports that do not have a versioned
dependency, since the binaries will most probably still stop working.
06 Jan 2009 17:59:31
Original commit files touched by this commit  1.4.9_1
 This port version is marked as vulnerable.
pav search for other commits by this committer
- Remove conditional checks for FreeBSD 5.x and older
21 Aug 2008 06:18:49
Original commit files touched by this commit  1.4.9_1
 This port version is marked as vulnerable.
rafan search for other commits by this committer
Update CONFIGURE_ARGS for how we pass CONFIGURE_TARGET to configure script.
Specifically, newer autoconf (> 2.13) has different semantic of the
configure target. In short, one should use --build=CONFIGURE_TARGET
instead of CONFIGURE_TARGET directly. Otherwise, you will get a warning
and the old semantic may be removed in later autoconf releases.

To workaround this issue, many ports hack the CONFIGURE_TARGET variable
so that it contains the ``--build='' prefix.

To solve this issue, under the fact that some ports still have
configure script generated by the old autoconf, we use runtime detection
in the do-configure target so that the proper argument can be used.

Changes to Mk/*:
 - Add runtime detection magic in bsd.port.mk
(Only the first 15 lines of the commit message are shown above View all of this commit message)
11 Aug 2008 12:27:53
Original commit files touched by this commit  1.4.9_1
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Fix plist with NOPORTDOCS.

Reported by:    QA Tindy (itetcu)
06 Jun 2008 14:01:07
Original commit files touched by this commit  1.4.9_1
 This port version is marked as vulnerable.
edwin search for other commits by this committer
Bump portrevision due to upgrade of devel/gettext.

The affected ports are the ones with gettext as a run-dependency
according to ports/INDEX-7 (5007 of them) and the ones with USE_GETTEXT
in Makefile (29 of them).

PR:             ports/124340
Submitted by:   edwin@
Approved by:    portmgr (pav)
26 Apr 2008 23:51:41
Original commit files touched by this commit  1.4.9
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 1.4.9

Notes:
        This update fixes a possible security vulnerability
        involving memory corruption from importing malicious
        keys.

PR:             122349 / 122155
Submitted by:   Nick Barkas <snb@threerings.net> / Hirohisa Yamaguchi
<umq@ueo.co.jp>
Approved by:    maintainer timeout
Security:      
http://www.vuxml.org/freebsd/30394651-13e1-11dd-bab7-0016179b2dd5.html
12 Jan 2008 08:53:44
Original commit files touched by this commit  1.4.8
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.8 (GPL3).

PR:             ports/118894
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp>
04 Oct 2007 06:00:24
Original commit files touched by this commit  1.4.7_1
 This port version is marked as vulnerable.
edwin search for other commits by this committer
Remove always-false/true conditions based on OSVERSION 500000
23 Jul 2007 09:36:52
Original commit files touched by this commit  1.4.7_1
 This port version is marked as vulnerable.
rafan search for other commits by this committer
- Set --mandir and --infodir in CONFIGURE_ARGS if the configure script
  supports them.  This is determined by running ``configure --help'' in
  do-configure target and set the shell variable _LATE_CONFIGURE_ARGS
  which is then passed to CONFIGURE_ARGS.
- Remove --mandir and --infodir in ports' Makefile where applicable
  Few ports use REINPLACE_CMD to achieve the same effect, remove them too.
- Correct some manual pages location from PREFIX/man to MANPREFIX/man
- Define INFO_PATH where necessary
- Document that .info files are installed in a subdirectory relative to
  PREFIX/INFO_PATH and slightly change add-plist-info to use INFO_PATH and
  subdirectory detection.

PR:             ports/111470
Approved by:    portmgr
Discussed with: stas (Mk/*), gerald (info related stuffs)
Tested by:      pointyhat exp run
19 May 2007 20:32:57
Original commit files touched by this commit  1.4.7_1
 This port version is marked as vulnerable.
flz search for other commits by this committer
- Welcome X.org 7.2 \o/.
- Set X11BASE to ${LOCALBASE} for recent ${OSVERSION}.
- Bump PORTREVISION for ports intalling files in ${X11BASE}.
06 Mar 2007 09:06:19
Original commit files touched by this commit  1.4.7
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.7.
  Add safety seatbelt for inserting additional text in signed OpenPGP message.

References:    
http://lists.gnupg.org/pipermail/gnupg-devel/2007-March/023687.html,
               
http://lists.gnupg.org/pipermail/gnupg-devel/2007-March/023686.html
25 Dec 2006 03:49:00
Original commit files touched by this commit  1.4.6_3
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- I forgot to bump PORTREVISION to sync with security/gnupg as of
  before 2.0 upgrade.
- Add a patch to fix info/dir entry in gnupg1.info [1].
- Recover symlink during removing this port after installing
  security/gnupg (2.0) (I forgot to add this before...).

PR:             ports/106819 [1]
Submitted by:   Dmitry A Grigorovich <odip@bionet.nsc.ru>
09 Dec 2006 08:36:48
Original commit files touched by this commit  1.4.6
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Chase security/gnupg upgrade (but still 1.4.6) after repocopy.
  (not connected in ../Makefile)
- Tweak installation directory for documents to avoid conflict against
  coming gnupg upgrade (2.0.1).

I'm still testing my patch to upgrade to 2.0.1, so please wait. :-)

Number of commits found: 65

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
arjOct 19
cactiOct 19
mariadb100-serverOct 19
mariadb101-serverOct 19
mariadb102-serverOct 19
mariadb55-serverOct 19
mysql55-serverOct 19
mysql56-serverOct 19
mysql57-serverOct 19
percona55-serverOct 19
percona56-serverOct 19
percona57-serverOct 19
krb5Oct 18
krb5-113Oct 18
krb5-114Oct 18

22 vulnerabilities affecting 93 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 31601
Broken 154
Deprecated 77
Ignore 423
Forbidden 0
Restricted 175
No CDROM 78
Vulnerable 57
Expired 16
Set to expire 70
Interactive 0
new 24 hours 1
new 48 hours9
new 7 days16
new fortnight46
new month428

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2017 Dan Langille. All rights reserved.