On 05/06/2014 05:08 AM, Kristian Fiskerstrand wrote:
> Dear lists,
> 
> Following the release of SKS 1.1.5[0] the following changes will be
> made to the pools of sks-keyservers.net
> 
> subset.pool.sks-keyservers.net has been set to a minimum requirement
> of SKS 1.1.5 with immediate effect.
> 
> Due to CVE-2014-3207[1] I want to bump hkps.pool.sks-keyservers.net to
> a requirement of 1.1.5 as this can potentially be in another security
> context / zone, however I'm giving this a grace period of (at least)
> 45-60 days to allow server administrators to upgrade their servers.
> 
> I'm not making any changes to the main pool at this point.
> 
> References:
> [0] http://lists.nongnu.org/archive/html/sks-devel/2014-05/msg00026.html
> [1] http://www.openwall.com/lists/oss-security/2014/05/01/16
> 

For those that do run Debian... BTS #746626 has been opened as Important
and tagged as 'security upstream fixed-upstream' for 1.1.5 so hopefully
the maintainer team will get it updated within Jessie soon which will
then trigger the BPO for Wheezy.

_______________________________________________
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel

Reply via email to