Uploaded 2.6.8 for raring. ** Bug watch added: Debian Bug tracker #691394 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691394
** Also affects: opendkim (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691394 Importance: Unknown Status: Unknown ** Changed in: opendkim (Ubuntu Raring) Status: New => Fix Committed ** Changed in: opendkim (Ubuntu Raring) Importance: Undecided => High ** Changed in: opendkim (Ubuntu Raring) Assignee: (unassigned) => Scott Kitterman (kitterman) ** Changed in: opendkim (Ubuntu Raring) Milestone: None => ubuntu-13.04-beta-1 -- You received this bug notification because you are a member of Ubuntu Mail Server, which is subscribed to opendkim in Ubuntu. https://bugs.launchpad.net/bugs/1071139 Title: DomainKeys Identified Mail (DKIM) Verifiers may inappropriately convey message trust Status in “opendkim” package in Ubuntu: Fix Committed Status in “opendkim” source package in Lucid: New Status in “opendkim” source package in Natty: New Status in “opendkim” source package in Oneiric: New Status in “opendkim” source package in Precise: New Status in “opendkim” source package in Quantal: New Status in “opendkim” source package in Raring: Fix Committed Status in “opendkim” package in Debian: Unknown Bug description: See http://www.kb.cert.org/vuls/id/268267, VU#268267 opendkim in squeeze, wheezy, sid offers no method to prevent use of keys less than 1024 bits. This is added in the new upstream release, 2.6.8, that was released just for this issue. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/opendkim/+bug/1071139/+subscriptions _______________________________________________ Mailing list: https://launchpad.net/~ubuntu-mail-server Post to : [email protected] Unsubscribe : https://launchpad.net/~ubuntu-mail-server More help : https://help.launchpad.net/ListHelp

