Change logs for gnupg source package in Yakkety

  • gnupg (1.4.20-6ubuntu1) yakkety; urgency=medium
    
      * Merge with Debian. Remaining Ubuntu changes:
        - Disable mlock() test since it fails with ulimit 0 (on buildds).
        - Set gpg (or gpg2) and gpgsm to use a passphrase agent by default.
        - Only suggest gnupg-curl and libldap; recommendations are pulled into
          minimal, and we don't need the keyserver utilities in a minimal Ubuntu
          system.
        - Disable inline assembler for ppc64el.
        - Enable SHA-512 support in gpgv-udeb.
        - debian/patches/lp1541925.patch: Make sure directory exists before
          creating the lock.
      * SECURITY UPDATE: random number generator prediction
        - debian/patches/CVE-2016-6313-1.patch: improve readability by using a
          macro in cipher/random.c.
        - debian/patches/CVE-2016-6313-2.patch: hash continuous areas in the
          csprng pool in cipher/random.c.
        - CVE-2016-6313
    
    gnupg (1.4.20-6) unstable; urgency=medium
    
      * drop gpgv-win32, now handled by gnupg2 source package
      * fix armel gpgv1.4-udeb for cross-building (Closes: #820776)
    
    gnupg (1.4.20-5) unstable; urgency=medium
    
      * use autoreconf
      * avoid building the udeb for platforms that don't need it
      * bump Standards-Version to 3.9.7 (no changes needed)
    
    gnupg (1.4.20-4) unstable; urgency=medium
    
      [ Martin Michlmayr ]
      * add a gpgv1.4-udeb package for armel (Closes: #814027)
    
    gnupg (1.4.20-3) unstable; urgency=medium
    
      * drop Thijs from uploaders at his request.  Thanks for all the work!
    
    gnupg (1.4.20-2) unstable; urgency=medium
    
      * drop gpgv-udeb package -- it should now be built by gnupg2.
      * drop gnupg-dbg package since we now have auto-generated -dbgsym packages
    
     -- Marc Deslauriers <email address hidden>  Fri, 19 Aug 2016 07:40:34 -0400
  • gnupg (1.4.20-1ubuntu4) yakkety; urgency=medium
    
      * SECURITY UPDATE: random number generator prediction
        - debian/patches/CVE-2016-6313-1.patch: improve readability by using a
          macro in cipher/random.c.
        - debian/patches/CVE-2016-6313-2.patch: hash continuous areas in the
          csprng pool in cipher/random.c.
        - CVE-2016-6313
    
     -- Marc Deslauriers <email address hidden>  Wed, 17 Aug 2016 13:32:13 -0400
  • gnupg (1.4.20-1ubuntu3) xenial; urgency=medium
    
      * debian/patches/lp1541925.patch: switch to final upstream commit.
    
     -- Marc Deslauriers <email address hidden>  Fri, 12 Feb 2016 07:19:26 -0500