also sprach Alvin Oga <[EMAIL PROTECTED]> [2005.08.28.1328 +0200]: > nah ... they're doing fine .. to the extent is needed ?? > if it's important... they will post dsa ??
Where have you been? > what i think is needed is an automated script that checks > debian against known exploits or a way to verify that > the exploits/vulnerability does not affect debian This has been done. http://spohr.debian.org/~joeyh/stable-security.html http://spohr.debian.org/~joeyh/testing-security.html That doesn't mean the stable security team uses this information. From what I know, Joey prefers editing text files and expects others to do the same. -- Please do not send copies of list mail to me; I read the list! .''`. martin f. krafft <[EMAIL PROTECTED]> : :' : proud Debian developer and author: http://debiansystem.info `. `'` `- Debian - when you have better things to do than fixing a system Invalid/expired PGP (sub)keys? Use subkeys.pgp.net as keyserver! "on the other hand, with the advent of msvc 5, i can claim i use emacs because it's smaller and more efficient." :-)" -- darin johnson
signature.asc
Description: Digital signature (GPG/PGP)