Wed Dec 18 18:56:24 2013 UTC ()
Update to 1.4.16:
Noteworthy changes in version 1.4.16 (2013-12-18)
-------------------------------------------------
* Fixed the RSA Key Extraction via Low-Bandwidth Acoustic
Cryptanalysis attack as described by Genkin, Shamir, and Tromer.
See <http://www.cs.tau.ac.il/~tromer/acoustic/>. [CVE-2013-4576]
* Put only the major version number by default into armored output.
* Do not create a trustdb file if --trust-model=always is used.
* Print the keyid for key packets with --list-packets.
* Changed modular exponentiation algorithm to recover from a small
performance loss due to a change in 1.4.14.
(wiz)
diff -r1.122 -r1.123 pkgsrc/security/gnupg/Makefile
diff -r1.62 -r1.63 pkgsrc/security/gnupg/distinfo
--- pkgsrc/security/gnupg/Makefile 2013/10/26 23:30:29 1.122
+++ pkgsrc/security/gnupg/Makefile 2013/12/18 18:56:24 1.123
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.122 2013/10/26 23:30:29 wiz Exp $
+# $NetBSD: Makefile,v 1.123 2013/12/18 18:56:24 wiz Exp $
-DISTNAME= gnupg-1.4.15
+DISTNAME= gnupg-1.4.16
CATEGORIES= security
MASTER_SITES= ftp://ftp.gnupg.org/gcrypt/gnupg/ \
http://gd.tuwien.ac.at/privacy/gnupg/gnupg/ \
--- pkgsrc/security/gnupg/distinfo 2013/10/05 13:19:51 1.62
+++ pkgsrc/security/gnupg/distinfo 2013/12/18 18:56:24 1.63
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.62 2013/10/05 13:19:51 wiz Exp $
+$NetBSD: distinfo,v 1.63 2013/12/18 18:56:24 wiz Exp $
-SHA1 (gnupg-1.4.15.tar.bz2) = 63ebf0ab375150903c65738070e4105200197fd4
-RMD160 (gnupg-1.4.15.tar.bz2) = d655bd65f644d2649eebddf7cd578259a04310de
-Size (gnupg-1.4.15.tar.bz2) = 3654415 bytes
+SHA1 (gnupg-1.4.16.tar.bz2) = 0bf5e475f3eb6f33d5474d017fe5bf66070e43f4
+RMD160 (gnupg-1.4.16.tar.bz2) = 21eb6018d3c33c93f5729d98dc4d7a2699801bc5
+Size (gnupg-1.4.16.tar.bz2) = 3656752 bytes
SHA1 (patch-ab) = 24e200a04f8f31e53e22dc80ed079570cb5de8d8