popularity-contest
ben darby
ben at cvrse.com
Fri Mar 30 22:49:10 UTC 2007
* Derek Broughton wrote:
> Jeffrey F. Bloss wrote:
>
> > There's no reason to go as far as China for real life examples of how
> > this sort of thing might be a problem. The version of GnuPG Ubuntu
> > distributes in their own repositories, for example, is horribly out of
> > date and known to have serious bugs. The CVE calls it a "remotely
> > controllable function pointer" issue...
> >
> > http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000246.html
> >
> > Painfully ironic as it is, by blabbing about your vulnerable copy of
> > GnuPG you're actually opening a piece of software you depend on for
> > *security* up to a wider audience of potential attackers, and giving
>
> And you're absolutely sure that, just because Ubuntu's Gnupg is still
> v1.4.3, that it has that vulnerability? The latest security update to
> gnupg in edgy-security is March 7, and while I don't have time to check,
> almost certainly backports fixes for all known vulnerabilities to that
> point.
https://lists.ubuntu.com/archives/ubuntu-security-announce/2006-December/000448.html
looks like it was patched the following day!
--
ben darby
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-users/attachments/20070331/a989b726/attachment.sig>
More information about the ubuntu-users
mailing list