Debian Package Tracker
Register | Log in
Subscribe

gnupg1

GNU privacy guard - a PGP implementation (deprecated "classic" version)

Choose email to subscribe with

general
  • source: gnupg1 (main)
  • version: 1.4.23-1.1
  • maintainer: Debian GnuPG-Maintainers (archive) (DMD)
  • uploaders: Eric Dorland [DMD] – Daniel Kahn Gillmor [DMD] – Sune Vuorela [DMD]
  • arch: all any
  • std-ver: 4.1.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.4.21-4+deb9u1
  • o-o-sec: 1.4.21-4+deb9u1
  • oldstable: 1.4.23-1
  • stable: 1.4.23-1.1
  • testing: 1.4.23-1.1
  • unstable: 1.4.23-1.1
versioned links
  • 1.4.21-4+deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.4.23-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.4.23-1.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • gnupg1 (3 bugs: 0, 2, 1, 0)
  • gnupg1-l10n
  • gpgv1 (1 bugs: 0, 0, 1, 0)
action needed
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2019-14855: A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.
Created: 2022-07-04 Last update: 2022-08-01 13:40
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2019-14855: A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.
Created: 2022-07-04 Last update: 2022-08-01 13:40
lintian reports 1 error and 2 warnings high
Lintian reports 1 error and 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2021-01-27 Last update: 2022-07-30 12:13
Depends on packages which need a new maintainer normal
The packages that gnupg1 depends on which need a new maintainer are:
  • xloadimage (#919265)
    • Suggests: xloadimage
Created: 2019-11-22 Last update: 2023-02-06 19:56
2 new commits since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit f1d7eb435f371dadf62ca0e935ee5b3ecf0df3cd
Merge: 30fde8a7 768da1d0
Author: Jelmer Vernooij <jelmer@debian.org>
Date:   Sun Oct 30 17:09:19 2022 +0000

    Merge branch 'multiarch-fixes' into 'debian/master'
    
    Apply hints suggested by the multi-arch hinter
    
    See merge request debian/gnupg1!2

commit 768da1d0889d82f9b5159ca35fa3b91a2f35d08d
Author: Debian Janitor <janitor@jelmer.uk>
Date:   Mon Oct 17 15:36:16 2022 +0000

    Apply multi-arch hints.
    + gnupg1-l10n: Add Multi-Arch: foreign.
    
    Changes-By: apply-multiarch-hints
Created: 2022-10-30 Last update: 2023-02-02 06:12
Multiarch hinter reports 1 issue(s) low
There are issues with the multiarch metadata for this package.
  • gnupg1-l10n could be marked Multi-Arch: foreign
Created: 2016-09-14 Last update: 2023-02-06 20:30
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2019-07-15 Last update: 2019-07-15 08:19
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.1.4).
Created: 2018-08-20 Last update: 2022-12-17 19:18
No known security issue in bullseye wishlist

There is 1 open security issue in bullseye.

1 ignored issue:
  • CVE-2019-14855: A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.
Created: 2022-07-04 Last update: 2022-08-01 13:40
news
[rss feed]
  • [2021-01-09] gnupg1 1.4.23-1.1 MIGRATED to testing (Debian testing watch)
  • [2021-01-06] Accepted gnupg1 1.4.23-1.1 (source) into unstable (Christoph Biedl)
  • [2018-06-20] gnupg1 1.4.23-1 MIGRATED to testing (Debian testing watch)
  • [2018-06-12] Accepted gnupg1 1.4.21-4+deb9u1 (source) into proposed-updates->stable-new, proposed-updates (Salvatore Bonaccorso)
  • [2018-06-11] Accepted gnupg1 1.4.23-1 (source) into unstable (Daniel Kahn Gillmor)
  • [2018-06-08] Accepted gnupg1 1.4.21-4+deb9u1 (source) into stable->embargoed, stable (Salvatore Bonaccorso)
  • [2018-06-08] Accepted gnupg1 1.4.22-5 (source) into unstable (Daniel Kahn Gillmor)
  • [2018-02-11] gnupg1 1.4.22-4 MIGRATED to testing (Debian testing watch)
  • [2018-02-06] Accepted gnupg1 1.4.22-4 (source) into unstable (Daniel Kahn Gillmor)
  • [2017-10-02] gnupg1 1.4.22-3 MIGRATED to testing (Debian testing watch)
  • [2017-09-26] Accepted gnupg1 1.4.22-3 (source) into unstable (Daniel Kahn Gillmor)
  • [2017-09-26] Accepted gnupg1 1.4.22-2 (source) into unstable (Daniel Kahn Gillmor)
  • [2017-08-07] gnupg1 1.4.22-1 MIGRATED to testing (Debian testing watch)
  • [2017-08-02] Accepted gnupg1 1.4.22-1 (source) into unstable (Daniel Kahn Gillmor)
  • [2017-05-25] gnupg1 1.4.21-4 MIGRATED to testing (Debian testing watch)
  • [2017-03-29] Accepted gnupg1 1.4.21-4 (source) into unstable (Daniel Kahn Gillmor)
  • [2017-02-17] Accepted gnupg1 1.4.21-3 (source) into unstable (Daniel Kahn Gillmor)
  • [2016-11-19] gnupg1 1.4.21-2 MIGRATED to testing (Debian testing watch)
  • [2016-11-14] Accepted gnupg1 1.4.21-2 (source) into unstable (Daniel Kahn Gillmor)
  • [2016-09-04] gnupg1 1.4.21-1 MIGRATED to testing (Debian testing watch)
  • [2016-08-29] Accepted gnupg1 1.4.21-1 (source) into unstable (Daniel Kahn Gillmor)
  • [2016-08-18] gnupg1 1.4.20-7 MIGRATED to testing (Debian testing watch)
  • [2016-08-12] Accepted gnupg1 1.4.20-7 (source) into unstable (Daniel Kahn Gillmor)
  • [2016-08-08] Accepted gnupg1 1.4.20-6+exp5 (source) into experimental (Daniel Kahn Gillmor)
  • [2016-08-08] Accepted gnupg1 1.4.20-6+exp4 (source amd64 all) into experimental, experimental (Daniel Kahn Gillmor)
bugs [bug history graph]
  • all: 5
  • RC: 0
  • I&N: 2
  • M&W: 2
  • F&P: 1
  • patch: 0
links
  • homepage
  • lintian (1, 2)
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 76)
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.4.23-1.1build1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing