Serious remotely exploitable hole in GnuPG

Just in case you haven't heard of this yet: GnuPG <= 1.4.5 contains a remotely exploitable security issue which has been fixed in 1.4.6.

You should really upgrade ASAP, as this problem can (theoretically) occur when GnuPG decrypts/checks encrypted email messages/signatures (for example).

If you're running Debian unstable: apt-get install gnupg

Debian updates

Just to prove the world I'm doing Debian work sometimes: I have recently updated the flobopuyo package (needed rebuild because of the C++ transition), the bfbtester package (hey, it took me only three attempts until I f*cking figured out why I couldn't change the section), and cccd (cosmetic stuff).

Nothing to see here, move on.

Syndicate content