• Bug#1100074: gpg: gpg changes representation of certifications from exp

    From Daniel Kahn Gillmor@21:1/5 to All on Tue Mar 11 01:10:01 2025
    Package: gpg
    Version: 2.2.46-4
    Severity: serious
    Control: notfound -1 2.2.46-3
    Control: affects -1 + libgnupg-interface-perl
    Control: forwarded -1 https://dev.gnupg.org/T7547#198934

    The fix for #1099141 introduced a new regression in the behavior of
    GnuPG when evaluating certifications from expired OpenPGP certificates.

    I've reported the problem upstream on T7547, where the attempts to
    mitigate the side effects of fixing the verification DoS:

    https://dev.gnupg.org/T7547#198934

    GnuPG should probaby not migrate into testing until this part is also
    resolved.

    --dkg

    -- System Information:
    Debian Release: trixie/sid
    APT prefers testing-debug
    APT policy: (500, 'testing-debug'), (500, 'testing'), (200, 'unstable-debug'), (200, 'unstable'), (1, 'experimental-debug'), (1, 'experimental')
    Architecture: amd64 (x86_64)

    Kernel: Linux 6.12.12-amd64 (SMP w/20 CPU threads; PREEMPT)
    Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
    Shell: /bin/sh linked to /usr/bin/dash
    Init: systemd (via /run/systemd/system)
    LSM: AppArmor: enabled

    Versions of packages gpg depends on:
    ii gpgconf 2.2.46-4
    ii libassuan9 3.0.2-2
    ii libbz2-1.0 1.0.8-6
    ii libc6 2.40-7
    ii libgcrypt20 1.11.0-7
    ii libgpg-error0 1.51-3
    ii libreadline8t64 8.2-6
    ii libsqlite3-0 3.46.1-1
    ii zlib1g 1:1.3.dfsg+really1.3.1-1+b1

    Versions of packages gpg recommends:
    ii gnupg 2.2.46-4

    gpg suggests no packages.

    -- no debconf information

    -----BEGIN PGP SIGNATURE-----

    iHUEARYIAB0WIQRjrBGOWy5dZsiKhad4C4VO2cK0lgUCZ89+3gAKCRB4C4VO2cK0 lsSlAQDjr8jgQR07c/iKv4Eo8Kh1LXiS13iZoIlWF8nRlizCrQD+PInRR7z5rDYf Czls//ZMyJJ9ziYkc8bCXYaUbfw4yQA=
    =JlVP
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Debian Bug Tracking System@21:1/5 to All on Tue Mar 11 01:10:01 2025
    Processing control commands:

    notfound -1 2.2.46-3
    Bug #1100074 [gpg] gpg: gpg changes representation of certifications from expired certs, breaks test suite for GnuPG::Interface
    Ignoring request to alter found versions of bug #1100074 to the same values previously set
    affects -1 + libgnupg-interface-perl
    Bug #1100074 [gpg] gpg: gpg changes representation of certifications from expired certs, breaks test suite for GnuPG::Interface
    Added indication that 1100074 affects libgnupg-interface-perl
    forwarded -1 https://dev.gnupg.org/T7547#198934
    Bug #1100074 [gpg] gpg: gpg changes representation of certifications from expired certs, breaks test suite for GnuPG::Interface
    Set Bug forwarded-to-address to 'https://dev.gnupg.org/T7547#198934'.

    --
    1100074: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100074
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Debian Bug Tracking System@21:1/5 to Daniel Kahn Gillmor on Fri Mar 14 15:00:01 2025
    This is a multi-part message in MIME format...

    Your message dated Fri, 14 Mar 2025 09:55:23 -0400
    with message-id <87r02zvhro.fsf@fifthhorseman.net>
    and subject line Re: Bug#1100074: gpg: gpg changes representation of certifications from expired certs, breaks test suite for GnuPG::Interface
    has caused the Debian Bug report #1100074,
    regarding gpg: gpg changes representation of certifications from expired certs, breaks test suite for GnuPG::Interface
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    1100074: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100074
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    Received: (at submit) by bugs.debian.org; 11 Mar 2025 00:08:10 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
    (2021-04-09) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-33.0 required=4.0 tests=BAYES_00,
    BODY_INCLUDES_CONTROL_AFFECTS,BODY_INCLUDES_PACKAGE,DKIM_SIGNED,
    DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FOURLA,HAS_PACKAGE,MDO_DATING14,
    PGPSIGNATURE,SPF_HELO_NONE,SPF_PASS,X_DEBBUGS_CC autolearn=ham
    autolearn_force=no version=3.4.6-bugs.debian.org_2005_01_02 X-Spam-Bayes: score:0.0000 Tokens: new, 8; hammy, 150; neutral, 122; spammy,
    0. spammytokens: hammytokens:0.000-+--H*ct:pgp-sha256, 0.000-+--trixie,
    0.000-+--H*ct:application, 0.000-+--H*ct:protocol,
    0.000-+--H*ct:micalg
    Return-path: <dkg@fifthhorseman.net>
    Received: from che.mayfirst.org ([2001:470:1:116::7]:54583)
    by buxtehude.debian.org