Hi,
On Fri Dec 28, 2007 at 19:19:50 -0500, Jim Popovitch wrote:
On Fri, 2007-12-28 at 22:36 +0100, Martin Zobel-Helas wrote:
On Fri Dec 28, 2007 at 22:10:08 +0100, Wolfgang Jeltsch wrote:
However, I cannot see any security announcement for most of these. Were
they
updated because
In article [EMAIL PROTECTED] you wrote:
These releases are called 'point releases' and are prepared publicly.
Preperation mails to these point releases are periodicly sent to
[EMAIL PROTECTED] Also prior releases had
'Miscellaneous Bugfixes', see eg. [2]. The list of 'Miscellaneous
Bugfixes'
Bernd Eckenfels wrote:
In article [EMAIL PROTECTED] you wrote:
These releases are called 'point releases' and are prepared publicly.
Preperation mails to these point releases are periodicly sent to
[EMAIL PROTECTED] Also prior releases had
'Miscellaneous Bugfixes', see eg. [2]. The list of
On Sun, May 20, 2007 at 08:33:16PM +0200, Martin Zobel-Helas wrote:
On Sun May 20, 2007 at 17:29:19 +0300, Touko Korpela wrote:
Unrar (source package unrar-nonfree) has CVE-2007-0855 (Stack-based buffer
overflow) bug in etch and sarge. It has debian bug #410580
Maintainer didn't ask for it
Touko Korpela wrote:
On Sun, May 20, 2007 at 08:33:16PM +0200, Martin Zobel-Helas wrote:
On Sun May 20, 2007 at 17:29:19 +0300, Touko Korpela wrote:
Unrar (source package unrar-nonfree) has CVE-2007-0855 (Stack-based buffer
overflow) bug in etch and sarge. It has debian bug #410580
Maintainer
5 matches
Mail list logo