I've just heard about a potential vulnerability in OpenSSL.  See
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743883 for the Debian 
version of this problem.

In particular, the message states

all
keys used with vulnerable processes will need to be replaced both in
Debian infrastructure and by all users of this package.

I'm wondering whether monotone use is affected by this problem.  I 
don't know if it even uses OpenSSL or some other signature mechanism.

-- hendrik


_______________________________________________
Monotone-devel mailing list
Monotone-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/monotone-devel

Reply via email to