December 2014 Archives by subject
Starting: Mon Dec 1 11:30:51 UTC 2014
Ending: Tue Dec 30 15:15:47 UTC 2014
Messages: 101
- [Pkg-gnupg-maint] 2015年卓越工程师教育培养计划骨干教师研讨会的通知(2015年2月6-9日・珠海)
灵创国际交流中心
- [Pkg-gnupg-maint] Bug#640241: gnupg: secret key without public key - skipped
Werner Koch
- [Pkg-gnupg-maint] Bug#739424: marked as done (gnupg dies with "gpg: out of secure memory [...]" since 1.4.16-1)
Debian Bug Tracking System
- [Pkg-gnupg-maint] Bug#768345: devscripts: upstream signature verification fails with gpg 2.1
Axel Beckert
- [Pkg-gnupg-maint] Bug#769460: marked as done (gnupg2 2.1.0-1 --refresh-keys breaks with dirmngr < 2.1.0-1)
Debian Bug Tracking System
- [Pkg-gnupg-maint] Bug#769571: marked as done (French translation update)
Debian Bug Tracking System
- [Pkg-gnupg-maint] Bug#770726: marked as done (gnupg: [INTL:es] Spanish po translation)
Debian Bug Tracking System
- [Pkg-gnupg-maint] Bug#770816: marked as done (gnupg: [INTL:nl] Dutch translations for gnupg package)
Debian Bug Tracking System
- [Pkg-gnupg-maint] Bug#770893: marked as done ([L10n] libgpg-error 1.17-2: [INTL:pt] Portuguese translation for libgpg-error package)
Debian Bug Tracking System
- [Pkg-gnupg-maint] Bug#771263: Bug#771263: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity
NIIBE Yutaka
- [Pkg-gnupg-maint] Bug#771263: Bug#771263: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity
Pandu Rao
- [Pkg-gnupg-maint] Bug#771666: dirmngr: Hostname verification uses the wrong hostname
Tristan Seligmann
- [Pkg-gnupg-maint] Bug#771976: Bug#771976: Insists upon locking trustdb even for read-only operations
Daniel Kahn Gillmor
- [Pkg-gnupg-maint] Bug#771976: Insists upon locking trustdb even for read-only operations
Elliott Mitchell
- [Pkg-gnupg-maint] Bug#771987: gnupg: several gnupg failures (infinite loop, NULL deref, out-of-bounds read, printing failure) on bad input
Daniel Kahn Gillmor
- [Pkg-gnupg-maint] Bug#771987: marked as done (gnupg: several gnupg failures (infinite loop, NULL deref, out-of-bounds read, printing failure) on bad input)
Debian Bug Tracking System
- [Pkg-gnupg-maint] Bug#771992: gnupg: gpg --verify FILE is insecure for detached sigs
Daniel Kahn Gillmor
- [Pkg-gnupg-maint] Bug#771992: marked as done (gnupg: gpg --verify FILE is insecure for detached sigs)
Debian Bug Tracking System
- [Pkg-gnupg-maint] Bug#772654: gnupg2: %g does not work correctly in --sig-notation
Tristan Seligmann
- [Pkg-gnupg-maint] Bug#772654: marked as done (gnupg2: %g does not work correctly in --sig-notation)
Debian Bug Tracking System
- [Pkg-gnupg-maint] Bug#772780: gnupg: "out of secure memory" even with only 4096-RSA keys when using addkey in --edit-key interface
David Z
- [Pkg-gnupg-maint] Bug#772780: gnupg: "out of secure memory" even with only 4096-RSA keys when using addkey in --edit-key interface
NIIBE Yutaka
- [Pkg-gnupg-maint] Bug#772780: gnupg: "out of secure memory" even with only 4096-RSA keys when using addkey in --edit-key interface
David Z
- [Pkg-gnupg-maint] Bug#772780: gnupg: "out of secure memory" even with only 4096-RSA keys when using addkey in --edit-key interface
David Z
- [Pkg-gnupg-maint] Bug#772780: gnupg: "out of secure memory" even with only 4096-RSA keys when using addkey in --edit-key interface
NIIBE Yutaka
- [Pkg-gnupg-maint] Bug#772780: gnupg: "out of secure memory" even with only 4096-RSA keys when using addkey in --edit-key interface
David Z
- [Pkg-gnupg-maint] Bug#772780: gnupg: "out of secure memory" even with only 4096-RSA keys when using addkey in --edit-key interface
NIIBE Yutaka
- [Pkg-gnupg-maint] Bug#772897: gnupg2: upgrade to 2.1 fails to import secret keys
Ximin Luo
- [Pkg-gnupg-maint] Bug#773414: gpg use-after-free
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773414: marked as done (gpg use-after-free)
Debian Bug Tracking System
- [Pkg-gnupg-maint] Bug#773415: [PATCH] gpgkey2ssh: clean up varargs
Daniel Kahn Gillmor
- [Pkg-gnupg-maint] Bug#773415: [PATCH] gpgkey2ssh: clean up varargs
Werner Koch
- [Pkg-gnupg-maint] Bug#773415: missing va_end
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773423: [PATCH] avoid double-close in unusual dotlock situations
Daniel Kahn Gillmor
- [Pkg-gnupg-maint] Bug#773423: [PATCH] avoid double-close in unusual dotlock situations
Werner Koch
- [Pkg-gnupg-maint] Bug#773423: double close
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773427: marked as done (Strange checking bug)
Debian Bug Tracking System
- [Pkg-gnupg-maint] Bug#773427: Strange checking bug
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773468: Fwd: missing check
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773468: marked as done (Fwd: missing check)
Debian Bug Tracking System
- [Pkg-gnupg-maint] Bug#773469: [PATCH] avoid future chance of using uninitialized memory
Daniel Kahn Gillmor
- [Pkg-gnupg-maint] Bug#773469: Fwd: uninitalized variable
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773470: Bug#773470: Fwd: off-by-one
Daniel Kahn Gillmor
- [Pkg-gnupg-maint] Bug#773470: Fwd: off-by-one
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773470: marked as done (Fwd: off-by-one)
Debian Bug Tracking System
- [Pkg-gnupg-maint] Bug#773471: [PATCH] avoid double-free on error condition in scd
Daniel Kahn Gillmor
- [Pkg-gnupg-maint] Bug#773471: CVE
Henri Salo
- [Pkg-gnupg-maint] Bug#773471: Fwd: Double free
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773472: [PATCH] avoid double-free on iconv failure
Daniel Kahn Gillmor
- [Pkg-gnupg-maint] Bug#773472: CVE
Henri Salo
- [Pkg-gnupg-maint] Bug#773472: Fwd: (not "use after free, and double free")
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773472: Fwd: not "use after free, and double free"
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773473: [PATCH] * sm/gpgsm.c: (parse_keyserver_line) return false on 'fail'.
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773473: Bug#773473: [PATCH] * sm/gpgsm.c: (parse_keyserver_line) return false on 'fail'.
Daniel Kahn Gillmor
- [Pkg-gnupg-maint] Bug#773473: Bug#773473: [PATCH] * sm/gpgsm.c: (parse_keyserver_line) return false on 'fail'.
Werner Koch
- [Pkg-gnupg-maint] Bug#773473: Fwd: gpg return-after-free
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773474: [PATCH] * scd/app-openpgp.c: (get_public_key) correctly close 'fp' upon use.
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773474: Fwd: incorrect file handling
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773475: Bug#773475: Fwd: missing va_end (x2)
Daniel Kahn Gillmor
- [Pkg-gnupg-maint] Bug#773475: Bug#773475: Fwd: missing va_end (x2)
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773475: Fwd: missing va_end (x2)
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773497: double file close
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773499: singleton used as array
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773502: off-by-one memory assignment
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773541: Update
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773507: explicit buffer overrun
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773518: Closing
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773518: explicit use-after-free
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773518: marked as done (explicit use-after-free)
Debian Bug Tracking System
- [Pkg-gnupg-maint] Bug#773518: use-after-free
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773541: Update
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773520: use-after-free
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773521: incorrect memset
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773541: Update
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773523: [PATCH] * dirmngr/ldapserver.c (ldapserver_parse_one) return NULL on 'fail'.
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773523: [PATCH] * dirmngr/ldapserver.c (ldapserver_parse_one) return NULL on 'fail'.
Werner Koch
- [Pkg-gnupg-maint] Bug#773523: use-after-free v2
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773541: uninitalized pointer read
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773541: Update
Joshua Rogers
- [Pkg-gnupg-maint] Bug#773705: gnupg: gpg(1) documents "--list-options show-usage", but gpg says "unknown option `show-usage'"
Axel Beckert
- [Pkg-gnupg-maint] Bug#773716: Should show requesting process PID/command as part of the pinentry text
Yuri D'Elia
- [Pkg-gnupg-maint] gnupg 1.4.18-5
Daniel Kahn Gillmor
- [Pkg-gnupg-maint] gnupg 1.4.18-6 MIGRATED to testing
Debian testing watch
- [Pkg-gnupg-maint] gnupg2_2.1.1-1_source.changes ACCEPTED into experimental
Debian FTP Masters
- [Pkg-gnupg-maint] gnupg_1.4.18-5_amd64.changes ACCEPTED into unstable
Debian FTP Masters
- [Pkg-gnupg-maint] gnupg_1.4.18-5_source.changes REJECTED
Debian FTP Masters
- [Pkg-gnupg-maint] gnupg_1.4.18-6_amd64.changes ACCEPTED into unstable
Debian FTP Masters
- [Pkg-gnupg-maint] gpa_0.9.7-1_amd64.changes ACCEPTED into experimental
Debian FTP Masters
- [Pkg-gnupg-maint] libgpg-error 1.17-3 MIGRATED to testing
Debian testing watch
- [Pkg-gnupg-maint] libgpg-error_1.17-3_source.changes ACCEPTED into unstable
Debian FTP Masters
- [Pkg-gnupg-maint] Processed: [bts-link] source package gpgme1.0
Debian Bug Tracking System
- [Pkg-gnupg-maint] Processed: Re: Bug#771976: Insists upon locking trustdb even for read-only operations
Debian Bug Tracking System
- [Pkg-gnupg-maint] Processed: Re: Bug#773470: Fwd: off-by-one
Debian Bug Tracking System
- [Pkg-gnupg-maint] Processed: tagging 771263
Debian Bug Tracking System
- [Pkg-gnupg-maint] Processing of gnupg2_2.1.1-1_source.changes
Debian FTP Masters
- [Pkg-gnupg-maint] Processing of gnupg_1.4.18-5_amd64.changes
Debian FTP Masters
- [Pkg-gnupg-maint] Processing of gnupg_1.4.18-5_source.changes
Debian FTP Masters
- [Pkg-gnupg-maint] Processing of gnupg_1.4.18-6_amd64.changes
Debian FTP Masters
- [Pkg-gnupg-maint] Processing of gpa_0.9.7-1_amd64.changes
Debian FTP Masters
- [Pkg-gnupg-maint] Processing of libgpg-error_1.17-3_source.changes
Debian FTP Masters
- [Pkg-gnupg-maint] who is the target audience of gpgme-tool?
Daniel Kahn Gillmor
- [Pkg-gnupg-maint] who is the target audience of gpgme-tool?
Werner Koch
- [Pkg-gnupg-maint] Work-needing packages report for Dec 26, 2014
Eric Dorland
- [Pkg-gnupg-maint] Work-needing packages report for Dec 26, 2014
Daniel Kahn Gillmor
Last message date:
Tue Dec 30 15:15:47 UTC 2014
Archived on: Tue Dec 30 15:18:31 UTC 2014
This archive was generated by
Pipermail 0.09 (Mailman edition).