http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=663757#27

> We believe that the bug you reported is fixed in the latest version of
> sks, which is due to be installed in the Debian FTP archive:
> 
> sks_1.1.3-1.debian.tar.gz
>   to main/s/sks/sks_1.1.3-1.debian.tar.gz
> sks_1.1.3-1.dsc
>   to main/s/sks/sks_1.1.3-1.dsc
> sks_1.1.3-1_amd64.deb
>   to main/s/sks/sks_1.1.3-1_amd64.deb
> sks_1.1.3.orig.tar.gz
>   to main/s/sks/sks_1.1.3.orig.tar.gz


John Clizbe wrote:
> I have exchanged some emails with the Debian SKS maintainer.
> 
> He is almost finished with the packaging and believes he can upload sks-1.1.3
> in the next few of days.
> 
> Once the new package is available, please consider upgraging to 1.1.3 ASAP.
> Servers running SKS prior to version 1.1.3 run the risk of returning erroneous
> search results to clients because they lack the ability to search subkey IDs
> by long ID or fingerprint.
> 
> There should be no requirement to rebuild SKS's database. Version changes in
> Berkeley DB since 4.6 have only required a change to the log file format. This
> is easy to accomplish. For details, see the document
> https://bitbucket.org/yminsky/sks-keyserver/src/3d12f5a0d7cf/UPGRADING
> 
> -John


_______________________________________________
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel

Reply via email to