|
|
Message-ID: <a5b000db3ddb1c25e18435218f88d6516bbfa7fa.camel@verbuecheln.ch>
Date: Mon, 29 Dec 2025 10:15:29 +0100
From: Stephan Verbücheln <stephan@...buecheln.ch>
To: oss-security@...ts.openwall.com
Subject: Re: Many vulnerabilities in GnuPG
GnuPG follows a traditional versioning scheme where even numbers (e.g.
2.2 and 2.4) are release branches and odd numbers (2.3 and 2.5) are
developer branches. So what we have to wait for is 2.4.9 fixing the
vulnerabilities.
Alternatively, distributions will fix the critical ones independently.
For instance, Debian 13 Trixie is using 2.4.7 and applies patches
downstream.
Regards
Download attachment "signature.asc" of type "application/pgp-signature" (229 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.