Package: release.debian.org
Severity: normal
Tags: trixie
X-Debbugs-Cc: [email protected], [email protected]
Control: affects -1 + src:gnupg2
User: [email protected]
Usertags: pu

Good morning,

we would like to fix CVE-2025-68973 and three other issues from
gnupg(dot)fail in the January stable (and oldstable) update.

Quoting Salvatore Bonaccorso in 
https://alioth-lists.debian.net/pipermail/pkg-gnupg-maint/2025-December/010435.html

| Anyway, Moritz and I were today bit discussing anyway the gnupg2
| status and came back to the comment from Moritz about the point
| release. Given gnupg2 is so crucial in various ways within Debian and
| the point releases in 1.5 weeks ahead, we wanted to come back to
| suggest to make the point release updates with the key benefit to have
| gnupg2 exposed in public via the proposed updates suites as soon
| accepted.
| 
| Would you agree on this approach? The stable release managers private
| alias is CC'ed here so they are aware of this suggestion.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable


cu Andreas

PS: second try, 1st one was blocked because gnupg(dot)fail is in
spamhaus.
-- 
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'

Attachment: gnupg2_2.4.7-21+deb13u1.deb.diff.gz
Description: application/gzip

Attachment: signature.asc
Description: PGP signature

Reply via email to