Change logs for gnupg2 source package in Trusty

  • gnupg2 (2.0.22-3ubuntu1.4) trusty-security; urgency=medium
    
      * SECURITY UPDATE: missing sanitization of verbose output
        - debian/patches/CVE-2018-12020.patch: Sanitize diagnostic with
          the original file name.
        - CVE-2018-12020
    
     -- Steve Beattie <email address hidden>  Thu, 14 Jun 2018 11:05:25 -0700
  • gnupg2 (2.0.22-3ubuntu1.3) trusty-security; urgency=medium
    
      * Screen responses from keyservers (LP: #1409117)
        - d/p/0001-Screen-keyserver-responses.patch
        - d/p/0002-Make-screening-of-keyserver-result-work-with-multi-k.patch
        - d/p/0003-Add-kbnode_t-for-easier-backporting.patch
        - d/p/0004-gpg-Fix-regression-due-to-the-keyserver-import-filte.patch
      * Fix large key size regression from CVE-2014-5270 changes (LP: #1371766)
        - d/p/Add-build-and-runtime-support-for-larger-RSA-key.patch
        - debian/rules: build with --enable-large-secmem
      * SECURITY UPDATE: invalid memory read via invalid keyring
        - debian/patches/CVE-2015-1606.patch: skip all packets not allowed in
          a keyring in g10/keyring.c.
        - CVE-2015-1606
      * SECURITY UPDATE: memcpy with overlapping ranges
        - debian/patches/CVE-2015-1607.patch: use inline functions to convert
          buffer data to scalars in common/iobuf.c, g10/build-packet.c,
          g10/getkey.c, g10/keyid.c, g10/main.h, g10/misc.c,
          g10/parse-packet.c, g10/tdbio.c, g10/trustdb.c, include/host2net.h,
          kbx/keybox-dump.c, kbx/keybox-openpgp.c, kbx/keybox-search.c,
          kbx/keybox-update.c, scd/apdu.c, scd/app-openpgp.c,
          scd/ccid-driver.c, scd/pcsc-wrapper.c, tools/ccidmon.c.
        - CVE-2015-1607
     -- Marc Deslauriers <email address hidden>   Fri, 27 Mar 2015 08:18:55 -0400
  • gnupg2 (2.0.22-3ubuntu1.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: denial of service via uncompressing garbled packets
        - debian/patches/CVE-2014-4617.patch: limit number of extra bytes in
          g10/compress.c.
        - CVE-2014-4617
     -- Marc Deslauriers <email address hidden>   Thu, 26 Jun 2014 09:18:35 -0400
  • gnupg2 (2.0.22-3ubuntu1) trusty; urgency=medium
    
      * Merge from Debian, remaining changes:
        - Drop sh prefix from openpgp test environment as it leads to exec
        invocations of sh /bin/bash leading to syntax errors from sh.  Fixes
        FTBFS detected in Ubuntu saucy archive rebuild.
        - Add udev rules to give gpg access to some smartcard readers;
          Debian #543217.
        - debian/gnupg2.udev: udev rules to set ACLs on SCM smartcard readers.
        - Add upstart user job for gpg-agent.
    
    gnupg2 (2.0.22-3) unstable; urgency=low
    
      * debian/watch, debian/upstream-signing-key.pgp: Add upstream signing
        key for uscan verification.
      * debian/kbxutil.1, debian/rules: Add better description and regenerate
        the manpage.
      * debian/control: Remove version on gpg-idea conflict, add missing
        Breaks for gpgsm and convert Conflicts to Breaks for gpgv2.
      * debian/control: Move gnupg-agent to Depends for gpgsm instead of
        Replaces (which in turn should have been Recommends).
      * debian/control: Standards-Version to 3.9.5.
      * debian/copyright: Switch to a shiny DEP-5 copyright file.
    
    gnupg2 (2.0.22-2) unstable; urgency=low
    
      * debian/control: Fix Build-Conflicts on newer automakes. Thanks Chris
        Boot. (Closes: #726015)
      * debian/control: IDEA is no longer patented, drop its metion from the
        description. Thanks brian m. carlson. (Closes: #726139)
      * debian/rules: Disable the test suite on mips and mipsel to work around
        Bug:#730846.
     -- Dimitri John Ledkov <email address hidden>   Wed, 19 Feb 2014 15:08:39 +0000
  • gnupg2 (2.0.22-1ubuntu1) trusty; urgency=low
    
      * Merge from Debian, remaining changes:
        - Drop sh prefix from openpgp test environment as it leads to exec
        invocations of sh /bin/bash leading to syntax errors from sh.  Fixes
        FTBFS detected in Ubuntu saucy archive rebuild.
        - Add udev rules to give gpg access to some smartcard readers;
          Debian #543217.
        - debian/gnupg2.udev: udev rules to set ACLs on SCM smartcard readers.
        - Add upstart user job for gpg-agent.
    
    gnupg2 (2.0.22-1) unstable; urgency=low
    
      * New upstream version. Fixes CVE-2013-4402 and CVE-2013-4351. (Closes:
        #725433, #722724)
      * debian/gnupg2.install: Install gnupg-card-architecture.png for the
        info file.
    
    gnupg2 (2.0.21-2) unstable; urgency=low
    
      * debian/rules, debian/gnupg2.install: Switch libexecdir to
        /usr/lib/gnupg2 to install helper binaries to a non-multiarch specific
        location. (Closes: #717303)
      * debian/control, debian/gpgv2.install: Split out gpgv2 into its own
        package.
      * debian/control, debian/gnupg2.install, debian/kbxutil.1: Add rule and
        manpage for kbxutil using help2man. (Closes: #323494)
      * debian/patches/02-gpgv2-dont-link-libassuan.diff: Don't link gpgv2
        against libassuan as it's not used.
      * debian/rules: Install changelog for gpgv2.
    
    gnupg2 (2.0.21-1) unstable; urgency=low
    
      * New upstream release. (Closes: #613465, #720369)
      * debian/patches/01-gnupg2-rename.diff: Refresh patch.
      * debian/control: Fix Vcs-Git path.
      * debian/control: Now depends on libgpg-error >= 1.11.
      * debian/control: Build-Depends on automake1.11 since the test suite
        fails on newer versions. (Closes: #713287)
      * debian/control: Also need a Build-Conflicts on automake (<= 1.12).
     -- Dmitrijs Ledkovs <email address hidden>   Fri, 01 Nov 2013 22:15:05 +0000
  • gnupg2 (2.0.20-1ubuntu3) saucy; urgency=low
    
      * SECURITY UPDATE: incorrect no-usage-permitted flag handling
        - debian/patches/CVE-2013-4351.patch: correctly handle empty key flags
          in g10/getkey.c, g10/keygen.c, include/cipher.h.
        - CVE-2013-4351
      * SECURITY UPDATE: denial of service via infinite recursion
        - debian/patches/CVE-2013-4402.patch: set limits on number of filters
          and nested packets in common/iobuf.c, g10/mainproc.c.
        - CVE-2013-4402
     -- Marc Deslauriers <email address hidden>   Mon, 07 Oct 2013 15:38:03 -0400