Branches for Quantal

Name Status Last Modified Last Commit
lp://staging/ubuntu/quantal/gnupg2 2 Mature 2012-07-24 10:40:49 UTC
19. * debian/patches/long-keyids.diff: Us...

Author: Marc Deslauriers
Revision Date: 2012-07-24 10:40:49 UTC

* debian/patches/long-keyids.diff: Use the longest key ID available
  when requesting a key from a key server.
* debian/rules: don't generate config.guess, config.sub and version in
  clean target to prevent build cruft patches.
* debian/patches/debian-changes-2.0.17-2,
  debian/patches/debian-changes-2.0.17-2ubuntu1: removed, build cruft.

lp://staging/ubuntu/quantal-security/gnupg2 2 Mature 2013-10-07 15:50:38 UTC
21. * SECURITY UPDATE: incorrect no-usage...

Author: Marc Deslauriers
Revision Date: 2013-10-07 15:50:38 UTC

* SECURITY UPDATE: incorrect no-usage-permitted flag handling
  - debian/patches/CVE-2013-4351.patch: correctly handle empty key flags
    in g10/getkey.c, g10/keygen.c, include/cipher.h.
  - CVE-2013-4351
* SECURITY UPDATE: denial of service via infinite recursion
  - debian/patches/CVE-2013-4402.patch: set limits on number of filters
    and nested packets in common/iobuf.c, g10/mainproc.c.
  - CVE-2013-4402

lp://staging/ubuntu/quantal-updates/gnupg2 2 Mature 2013-10-07 15:50:38 UTC
21. * SECURITY UPDATE: incorrect no-usage...

Author: Marc Deslauriers
Revision Date: 2013-10-07 15:50:38 UTC

* SECURITY UPDATE: incorrect no-usage-permitted flag handling
  - debian/patches/CVE-2013-4351.patch: correctly handle empty key flags
    in g10/getkey.c, g10/keygen.c, include/cipher.h.
  - CVE-2013-4351
* SECURITY UPDATE: denial of service via infinite recursion
  - debian/patches/CVE-2013-4402.patch: set limits on number of filters
    and nested packets in common/iobuf.c, g10/mainproc.c.
  - CVE-2013-4402

lp://staging/ubuntu/quantal-proposed/gnupg2 1 Development 2012-07-27 20:08:30 UTC
19. * debian/patches/long-keyids.diff: Us...

Author: Marc Deslauriers
Revision Date: 2012-07-24 10:40:49 UTC

* debian/patches/long-keyids.diff: Use the longest key ID available
  when requesting a key from a key server.
* debian/rules: don't generate config.guess, config.sub and version in
  clean target to prevent build cruft patches.
* debian/patches/debian-changes-2.0.17-2,
  debian/patches/debian-changes-2.0.17-2ubuntu1: removed, build cruft.

14 of 4 results