aboutsummaryrefslogtreecommitdiff
path: root/content/blog/2022-07-14-gnupg.md
diff options
context:
space:
mode:
authorChristian Cleberg <hello@cleberg.net>2024-07-26 11:13:24 -0500
committerChristian Cleberg <hello@cleberg.net>2024-07-26 11:13:24 -0500
commitc6a33b78b9a75f5105a6847da9677c014327242e (patch)
treefd1a8a496b4aa3d23bac6241eae0ef871c29c4e3 /content/blog/2022-07-14-gnupg.md
parentbac5bae4327a6ccb2545d445a399c18de1aa9746 (diff)
downloadcleberg.net-c6a33b78b9a75f5105a6847da9677c014327242e.tar.gz
cleberg.net-c6a33b78b9a75f5105a6847da9677c014327242e.tar.bz2
cleberg.net-c6a33b78b9a75f5105a6847da9677c014327242e.zip
fix broken URLs
Diffstat (limited to 'content/blog/2022-07-14-gnupg.md')
-rw-r--r--content/blog/2022-07-14-gnupg.md8
1 files changed, 4 insertions, 4 deletions
diff --git a/content/blog/2022-07-14-gnupg.md b/content/blog/2022-07-14-gnupg.md
index 77e0623..5be27a6 100644
--- a/content/blog/2022-07-14-gnupg.md
+++ b/content/blog/2022-07-14-gnupg.md
@@ -61,7 +61,7 @@ or the libraries it uses:
([Source](https://www.di.ens.fr/~pnguyen/pub_Ng04.htm))
- GPG versions prior to 1.4.2.1 contain a false positive signature
verification bug.
- ([Source](https://lists.gnupg.%20org/pipermail/gnupg-announce/2006q1/000211.html))
+ ([Source](https://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000211.html))
- GPG versions prior to 1.4.2.2 cannot detect injection of unsigned data. (
[Source](https://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000218.html))
- Libgcrypt, a library used by GPG, contained a bug which enabled full key
@@ -69,13 +69,13 @@ or the libraries it uses:
update in 2017. ([Source](https://lwn.net/Articles/727179/))
- The [ROCA Vulnerability](https://en.wikipedia.org/wiki/ROCA_vulnerability)
affects RSA keys generated by YubiKey 4 tokens.
- ([Source](https://crocs.fi.%20muni.cz/_media/public/papers/nemec_roca_ccs17_preprint.pdf))
+ ([Source](https://crocs.fi.muni.cz/_media/public/papers/nemec_roca_ccs17_preprint.pdf))
- The [SigSpoof Attack](https://en.wikipedia.org/wiki/SigSpoof) allows an
attacker to spoof digital signatures.
- ([Source](https://arstechnica.%20com/information-technology/2018/06/decades-old-pgp-bug-allowed-hackers-to-spoof-just-about-anyones-signature/))
+ ([Source](https://arstechnica.com/information-technology/2018/06/decades-old-pgp-bug-allowed-hackers-to-spoof-just-about-anyones-signature/))
- Libgcrypt 1.9.0 contains a severe flaw related to a heap buffer overflow,
fixed in Libgcrypt 1.9.1
- ([Source](https://web.archive.%20org/web/20210221012505/https://www.theregister.com/2021/01/29/severe_libgcrypt_bug/))
+ ([Source](https://web.archive.org/web/20210221012505/https://www.theregister.com/2021/01/29/severe_libgcrypt_bug/))
### Platforms