Re: Security support incomplete? (was: Re: [SECURITY] [DSA 3455-1] curl security update)

2016-02-02 Thread Wolfgang Jeltsch
Am Dienstag, den 02.02.2016, 17:14 +0100 schrieb Yves-Alexis Perez: > On mar., 2016-02-02 at 17:37 +0200, Wolfgang Jeltsch wrote: > > Can anyone please clarify? In particular, I would like to know what the > > exact policies regarding coverage of security support are, and what >

Security support incomplete? (was: Re: [SECURITY] [DSA 3455-1] curl security update)

2016-02-02 Thread Wolfgang Jeltsch
Am Dienstag, den 02.02.2016, 10:58 +0100 schrieb Freddy Spierenburg: > Hi Wolfgang, > > On Tue, Feb 02, 2016 at 11:40:03AM +0200, Wolfgang Jeltsch wrote: > > I notice that there are no fixes for oldstable. Is oldstable not > > affected by this security issue? > [cut] >

Re: [SECURITY] [DSA 3455-1] curl security update

2016-02-02 Thread Wolfgang Jeltsch
Hi, I notice that there are no fixes for oldstable. Is oldstable not affected by this security issue? All the best, Wolfgang Am Mittwoch, den 27.01.2016, 12:16 + schrieb Alessandro Ghedini: > - > Debian Security Advisory

Re: [SECURITY] [DSA 2267-1] perl security update

2011-08-23 Thread Wolfgang Jeltsch
Am Freitag, den 01.07.2011, 19:52 +0200 schrieb Moritz Muehlenhoff: > - - > Debian Security Advisory DSA-2267-1 secur...@debian.org > http://www.debian.org/security/Moritz Muehlenhoff >

Re: secure execution of drivers

2008-11-25 Thread Wolfgang Jeltsch
Am Dienstag, 25. November 2008 06:41 schrieb Rolf Kutz: > On 21/11/08 09:29 +0100, Dani wrote: > > when the driver fault, I was in the midst of rebuilding the system and > > had multiple virtual machines running. The result was that reiserfs > > Did those VMs have reiserfs-partitions, too? > Reisef

Re: [SECURITY] [DSA 1605-1] DNS vulnerability impact on the libc stub resolver

2008-07-09 Thread Wolfgang Jeltsch
Am Mittwoch, 9. Juli 2008 22:39 schrieb Rick Moen: > Quoting Wolfgang Jeltsch ([EMAIL PROTECTED]): > > Am Mittwoch, 9. Juli 2008 20:51 schrieb Noah Meyerhans: > > > > I suggest that you install bind9, > […] > > > > configure it to only listen on 127.0

Re: [SECURITY] [DSA 1605-1] DNS vulnerability impact on the libc stub resolver

2008-07-09 Thread Wolfgang Jeltsch
Am Mittwoch, 9. Juli 2008 20:51 schrieb Noah Meyerhans: > On Wed, Jul 09, 2008 at 06:10:51PM +0200, Wolfgang Jeltsch wrote: > > > At this time, it is not possible to implement the recommended > > > countermeasures in the GNU libc stub resolver. > > > > I don’t hav

Re: [SECURITY] [DSA 1605-1] DNS vulnerability impact on the libc stub resolver

2008-07-09 Thread Wolfgang Jeltsch
Am Dienstag, 8. Juli 2008 19:05 schrieb Florian Weimer: > […] > At this time, it is not possible to implement the recommended > countermeasures in the GNU libc stub resolver. Hello, I don’t have bind9 installed. Am I affected by the libc stub resolver bug? > The following workarounds are avail

Re: [SECURITY] [DSA 1438-1] New tar packages fix several vulnerabilities

2007-12-28 Thread Wolfgang Jeltsch
Am Freitag, 28. Dezember 2007 16:29 schrieb Florian Weimer: > > Debian Security Advisory DSA-1438-1 [EMAIL PROTECTED] > http://www.debian.org/security/ Florian Weimer > December 28, 2

Re: [SECURITY] [DSA 1379-2] New openssl packages fix arbitrary code execution

2007-10-11 Thread Wolfgang Jeltsch
SH was said to be dependent on OpenSSL. In what way does SSH depend on OpenSSL? Under which circumstances do the security holes of OpenSSL cause security issues with SSH? Thank you for any help. Best regards, Wolfgang Jeltsch

Re: [SECURITY] [DSA 1103-1] New Linux kernel 2.6.8 packages fix several vulnerabilities

2006-06-28 Thread Wolfgang Jeltsch
Am Dienstag, 27. Juni 2006 07:00 schrieb Moritz Muehlenhoff: > [...] > http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/ > kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb > Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d This package is actually not new. I ins

Re: [SECURITY] [DSA 862-1] New Ruby 1.6 packages fix safety bypass

2005-10-11 Thread Wolfgang Jeltsch
Am Dienstag, 11. Oktober 2005 09:01 schrieb Martin Schulze: > [...] > Package: ruby1.8 Ruby 1.6 or Ruby 1.8? > [...] [Please send answers also to my personal e-mail address.] Best wishes, Wolfgang -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble