* Merge with Debian. Remaining Ubuntu changes:
- Disable mlock() test since it fails with ulimit 0 (on buildds).
- Set gpg (or gpg2) and gpgsm to use a passphrase agent by default.
- Enable SHA-512 support in gpgv-udeb.
* Dropped changes, gnupg1 will not be in default installs:
- Only suggest gnupg-curl and libldap; recommendations are pulled into
minimal, and we don't need the keyserver utilities in a minimal Ubuntu
system.
* Dropped changes:
- Not present in Debian any more: Disable inline assembler for ppc64el.
- Drop lp1541925.patch, present in Debian as
0006-g10-Make-sure-to-have-the-directory-for-trustdb.patch
* SECURITY UPDATE: random number generator prediction
- debian/patches/CVE-2016-6313-1.patch: improve readability by using a
macro in cipher/random.c.
- debian/patches/CVE-2016-6313-2.patch: hash continuous areas in the
csprng pool in cipher/random.c.
- CVE-2016-6313
* rename source package from gnupg to gnupg1
* convert packaging to modern dh
* break out an arch-indep gnupg1-l10n package
* pull in several as-yet-unreleased upstream fixes
* fix upstream spelling errors and clean up lintian warnings
* update debian/watch, debian/control, and debian/copyright
gnupg1 (1.4.20-7ubuntu1) yakkety; urgency=medium
* Merge with Debian. Remaining Ubuntu changes: g10-Make- sure-to- have-the- directory- for-trustdb. patch patches/ CVE-2016- 6313-1. patch: improve readability by using a patches/ CVE-2016- 6313-2. patch: hash continuous areas in the
- Disable mlock() test since it fails with ulimit 0 (on buildds).
- Set gpg (or gpg2) and gpgsm to use a passphrase agent by default.
- Enable SHA-512 support in gpgv-udeb.
* Dropped changes, gnupg1 will not be in default installs:
- Only suggest gnupg-curl and libldap; recommendations are pulled into
minimal, and we don't need the keyserver utilities in a minimal Ubuntu
system.
* Dropped changes:
- Not present in Debian any more: Disable inline assembler for ppc64el.
- Drop lp1541925.patch, present in Debian as
0006-
* SECURITY UPDATE: random number generator prediction
- debian/
macro in cipher/random.c.
- debian/
csprng pool in cipher/random.c.
- CVE-2016-6313
gnupg1 (1.4.20-7) unstable; urgency=medium
* Release to unstable.
gnupg1 (1.4.20-6+exp5) experimental; urgency=medium
* two more fixes from upstream
* build-depend explicitly on automake
gnupg1 (1.4.20-6+exp4) experimental; urgency=medium
* make debian/copyright even more detailed.
gnupg1 (1.4.20-6+exp3) experimental; urgency=medium
* rename source package from gnupg to gnupg1
* convert packaging to modern dh
* break out an arch-indep gnupg1-l10n package
* pull in several as-yet-unreleased upstream fixes
* fix upstream spelling errors and clean up lintian warnings
* update debian/watch, debian/control, and debian/copyright
gnupg (1.4.20-6+exp2) experimental; urgency=medium
* corrected Conflicts with older gnupg binaries (Closes: #821910)
gnupg (1.4.20-6+exp1) experimental; urgency=medium
* ship binary packages gpgv1 and gnupg1, since gnupg2 source package is
now providing gpgv and gnupg in experimental
-- Dimitri John Ledkov <email address hidden> Wed, 31 Aug 2016 11:47:54 +0100