On Fri, Jul 04, 2008 at 07:36:57AM +1000, Russell Dickenson <[EMAIL PROTECTED]> 
wrote:
> I really should make this a standard email message :(  Because of
> illnesses in the family I haven't been able to spend much time on
> issue 27.  I hope to have it finished this weekend.  For what it's
> worth I've attached a draft.

thanks :) and no rush, your family is more important ;)

>      * Bitlbee-Skype has been upgraded to verson 0.6.0
> 
>        The Bitlbee-Skype package contains a plugin for Bitlbee which connects
>        to the Skype network. Of course many packages have been recently
>        upgraded but this one is special - it was developed by VMiklos. For
>        those that don't know, Bitlbee allows any IRC client to connect to
>        other networks, allowing for multi-chat-protocol chat sessions.

heh :) if you mention it, then it may make sense to mention this along
with the BitlBee-1.2.1 upgrade, the main reason i released it because of
the api changes: older versions do not work with the new BitlBee.

>    Here is a list of [10]security issues which have been discovered and fixed
>    in the 0.8 release since the previous newsletter.
> 
>      * FSA482 - net-snmp: A vulnerability has been reported in Net-SNMP,
>        which can be exploited by malicious people to spoof authenticated
>        SNMPv3 packets. Please upgrade to net-snmp-5.4.1-4kalgan2.
>      * FSA481 - horde-webmail: Some vulnerabilities have been reported in
>        various Horde products, which can be exploited by malicious users to
>        conduct script insertion attacks and by malicious people to conduct
>        cross-site scripting attacks. Please upgrade to
>        horde-webmail-1.1.1-1kalgan1.
>      * FSA480 - exiv2: A vulnerability has been reported in Exiv2, which
>        potentially can be exploited by malicious people to crash an
>        application using the library. Please upgrade to exiv2-0.16-2kalgan1.
>      * FSA479 - kernel: A vulnerability has been reported in the Linux
>        Kernel, which can be exploited by malicious people to cause a DoS
>        (Denial of Service) and potentially compromise a vulnerable system.
>        Please upgrade to kernel-2.6.24-4kalgan3.

don't forget to update this list before you plan to release the
newsletter, we have been pushed out a few more updates :) (xorg-server,
apache)

Attachment: pgpmV1er5u4G9.pgp
Description: PGP signature

_______________________________________________
Frugalware-devel mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-devel

Reply via email to