Spiros, please read the manual before you subscribe. It's below every TS email.
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org -- Met vriendelijke groet, Kees de Jong * * *De informatie opgenomen in deze e-mail kan vertrouwelijk zijn en is uitsluitend bestemd voor de geadresseerde(n).* * Indien u deze e-mail onterecht ontvangt, wordt u verzocht de inhoud niet te gebruiken en de afzender direct te informeren door de e-mail te retourneren. **Aan deze e-mail inclusief de bijlagen kunnen geen rechten ontleend worden, tenzij schriftelijk anders wordt overeengekomen.* --* The information contained in this e-mail may be confidential and is intended to be exclusively for the addressee(s). Should you receive this e-mail unintentionally, please do not use the contents herein and notify the sender immediately by return e-mail. This e-mail including the attachments are not legally binding, unless otherwise agreed upon in writing. ***--* * *My public GPG key: 0E503889* On Mon, Mar 4, 2013 at 11:32 PM, Spiros Denaxas <s.dena...@gmail.com> wrote: > unsubscribe > > On Mon, Mar 4, 2013 at 10:30 PM, Moritz Muehlenhoff <j...@debian.org> > wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA1 > > > > - > ------------------------------------------------------------------------- > > Debian Security Advisory DSA-2638-1 > secur...@debian.org > > http://www.debian.org/security/ Moritz > Muehlenhoff > > March 04, 2013 > http://www.debian.org/security/faq > > - > ------------------------------------------------------------------------- > > > > Package : openafs > > Vulnerability : buffer overflow > > Problem type : remote > > Debian-specific: no > > CVE ID : CVE-2013-1794 CVE-2013-1795 > > > > Multiple buffer overflows were discovered in OpenAFS, the implementation > > of the distributed filesystem AFS, which might result in denial of > > service or the execution of arbitrary code. Further information is > > available at http://www.openafs.org/security. > > > > For the stable distribution (squeeze), this problem has been fixed in > > version 1.4.12.1+dfsg-4+squeeze1. > > > > For the unstable distribution (sid), this problem has been fixed in > > version 1.6.1-3. > > > > We recommend that you upgrade your openafs packages. > > > > Further information about Debian Security Advisories, how to apply > > these updates to your system and frequently asked questions can be > > found at: http://www.debian.org/security/ > > > > Mailing list: debian-security-annou...@lists.debian.org > > -----BEGIN PGP SIGNATURE----- > > Version: GnuPG v1.4.12 (GNU/Linux) > > > > iEYEARECAAYFAlE1ICcACgkQXm3vHE4uylrOlQCg6kwBRETO/tr5SfUk1GrFtubp > > YPMAnA+FqS0AWVLBYzT69pNaOW4ULfA8 > > =rU8A > > -----END PGP SIGNATURE----- > > > > > > -- > > To UNSUBSCRIBE, email to > debian-security-announce-requ...@lists.debian.org > > with a subject of "unsubscribe". Trouble? Contact > listmas...@lists.debian.org > > Archive: > http://lists.debian.org/20130304223008.GA5658@pisco.westfalen.local > > > > > -- > To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org > with a subject of "unsubscribe". Trouble? Contact > listmas...@lists.debian.org > Archive: > http://lists.debian.org/cao6zhu0h5ed8npnhh-8js_h0sha8xe+kh1r_wcyso53avkp...@mail.gmail.com > >