I also dont give a fuck about security anymore. Cheers, Debian
P.S. I am just testing spamming filters and making a joke. I just hope there is some admin that can let it thru anyway. Thx. AreYouLoco? On February 16, 2016 1:55:20 PM GMT+01:00, Pierre Boesch <[email protected]> wrote: >https://www.debian.org/MailingLists/unsubscribe > > >Le 16/02/2016 13:22, Nicholas Brigden a écrit : >> Bonjour, >> >> Comment puis-je faire pour me supprimer de la liste de diffusion de >ces >> e-mails ? >> >> Je n'en ai plus le besoin désormais ayant renoncé à entretenir un >> serveur >> web. >> >> D'avance merci pour votre aide. >> >> Meilleures salutations >> Nicholas Brigden >> >> -----Message d'origine----- >> De : Salvatore Bonaccorso [mailto:[email protected]] >> Envoyé : jeudi 11 février 2016 19:54 >> À : [email protected] >> Objet : [SECURITY] [DSA 3473-1] nginx security update >> >> -----BEGIN PGP SIGNED MESSAGE----- >> Hash: SHA512 >> >> - >> >------------------------------------------------------------------------- >> Debian Security Advisory DSA-3473-1 >> [email protected] >> https://www.debian.org/security/ Salvatore >> Bonaccorso >> February 11, 2016 >> https://www.debian.org/security/faq >> - >> >------------------------------------------------------------------------- >> >> Package : nginx >> CVE ID : CVE-2016-0742 CVE-2016-0746 CVE-2016-0747 >> Debian Bug : 812806 >> >> Several vulnerabilities were discovered in the resolver in nginx, a >> small, >> powerful, scalable web/proxy server, leading to denial of service or, >> potentially, to arbitrary code execution. These only affect nginx if >> the >> "resolver" directive is used in a configuration file. >> >> For the oldstable distribution (wheezy), these problems have been >fixed >> in >> version 1.2.1-2.2+wheezy4. >> >> For the stable distribution (jessie), these problems have been fixed >in >> version 1.6.2-5+deb8u1. >> >> For the testing distribution (stretch), these problems have been >fixed >> in >> version 1.9.10-1. >> >> For the unstable distribution (sid), these problems have been fixed >in >> version 1.9.10-1. >> >> We recommend that you upgrade your nginx packages. >> >> Further information about Debian Security Advisories, how to apply >> these >> updates to your system and frequently asked questions can be found >at: >> https://www.debian.org/security/ >> >> Mailing list: [email protected] >> -----BEGIN PGP SIGNATURE----- >> Version: GnuPG v1 >> >> iQIcBAEBCgAGBQJWvNjDAAoJEAVMuPMTQ89EYJYP+wRI0isi0yByVdJ2k7yHv6Gy >> OMZQFi1OQYsVuKcSNBIrEMjLARosv9pWf7y7dEqOaePFE+IAsqaB5W4d7/9h7UTa >> KTscUcdDr3et+gR3taTMQvO6oK8HqqVOmPZu+z4lkjyQjOX12mQFppRHtfSe3uuF >> G073iAeRtf5OD4VXAcPUbYD2KGgVCm/dqkXBOF7uXQ+iHdI+YfEnBKwPH8ziWQyq >> VVBWF4Gsd+W80b0EZaIXKeNb7me7irWdlsAOFueCjmBNhcOJbao3llQ4eDF4vvzD >> AOVV+bq6jDoVY9OxRoRoUB8SFqLNfXspyICvuaJ4DDb0GSVMpoVpulz3fFT2BIF4 >> PZlDw/pwbXbRog8vW8zgGmyMTpc98aGDASHIo+fZuEgXTSLnQIMMeuOjHnB0DPmb >> lwOfY9wqnH3RDuvYKCOdbCDG0rRU3lApY+4pcRPMrbbseWUWevduLs289rzAdrTt >> cdo8EgnPkBRdESyq09fgs2034LxUSLDByMwv61rvzYCzlwmvqSxX4tiyCYiywB5e >> edA2xZthRca4V4v3OMaNFoal2fEeKMfC3IAFoHP4L7p35kSQMK8aTVfRvPKctAPo >> xXp78jelIgn9IP7GZ48yPao4rdoEZXo1ojZspzK6eZuSVW7BsgAOotaCSmjevbTP >> HG46YPDAFq9XmDt7BvEa >> =//2q >> -----END PGP SIGNATURE-----

