head 1.2; access; symbols pkgsrc-2013Q2:1.2.0.30 pkgsrc-2013Q2-base:1.2 pkgsrc-2012Q4:1.2.0.28 pkgsrc-2012Q4-base:1.2 pkgsrc-2011Q4:1.2.0.26 pkgsrc-2011Q4-base:1.2 pkgsrc-2011Q2:1.2.0.24 pkgsrc-2011Q2-base:1.2 pkgsrc-2009Q4:1.2.0.22 pkgsrc-2009Q4-base:1.2 pkgsrc-2008Q4:1.2.0.20 pkgsrc-2008Q4-base:1.2 pkgsrc-2008Q3:1.2.0.18 pkgsrc-2008Q3-base:1.2 cube-native-xorg:1.2.0.16 cube-native-xorg-base:1.2 pkgsrc-2008Q2:1.2.0.14 pkgsrc-2008Q2-base:1.2 pkgsrc-2008Q1:1.2.0.12 pkgsrc-2008Q1-base:1.2 pkgsrc-2007Q4:1.2.0.10 pkgsrc-2007Q4-base:1.2 pkgsrc-2007Q3:1.2.0.8 pkgsrc-2007Q3-base:1.2 pkgsrc-2007Q2:1.2.0.6 pkgsrc-2007Q2-base:1.2 pkgsrc-2007Q1:1.2.0.4 pkgsrc-2007Q1-base:1.2 pkgsrc-2006Q4:1.2.0.2 pkgsrc-2006Q4-base:1.2; locks; strict; comment @# @; 1.2 date 2006.12.12.13.12.44; author shannonjr; state dead; branches; next 1.1; 1.1 date 2006.11.27.20.37.20; author shannonjr; state Exp; branches; next ; desc @@ 1.2 log @Removed patch-ag becayse this is now in the pnupg code base @ text @$NetBSD: patch-ag,v 1.1 2006/11/27 20:37:20 shannonjr Exp $ --- ./g10/openfile.c.orig 2006-09-14 08:18:39.000000000 -0600 +++ ./g10/openfile.c @@@@ -145,7 +145,7 @@@@ ask_outfile_name( const char *name, size s = _("Enter new filename"); - n = strlen(s) + namelen + 10; + n = strlen(s) + (defname?strlen (defname):0) + 10; defname = name && namelen? make_printable_string( name, namelen, 0): NULL; prompt = xmalloc(n); if( defname ) @ 1.1 log @"While fixing a bug reported by Hugh Warrington, a buffer overflow has been identified in all released GnuPG versions. Exploiting this overflow seems to be possible. Apply the following patch to GnuPG." 2006-11-27 Werner Koch gnupg2 has been patched accordingly. @ text @d1 1 a1 1 $NetBSD$ @