On Fri, Nov 02, 2007 at 09:35:16PM +0100, Julian Heinbokel wrote:
> Am Donnerstag, 1. November 2007 07:06 schrieb Russ Allbery:
> i found the instructions in /usr/share/doc/rssh/CHROOT.gz incomplete, so
> after a long search i copied together this (ugly) skript, but by reading
> it you might find t
--On December 12, 2007 12:19:28 PM -0800 David de Hilario Richards
<[EMAIL PROTECTED]> wrote:
Hello Debian OS developers,
I have a suggestion for the Debian Project:
The system/administration section of the OS is password protected. This
is a good protection against viruses etc that wo
Hello Debian OS developers,
I have a suggestion for the Debian Project:
The system/administration section of the OS is password protected. This is a
good protection against viruses etc that would attack the OS but maybe the
Debian developers could include password protecting Emptying the Tras
* Stefan Novak <[EMAIL PROTECTED]> [071212 01:39]:
> Hello!
>
> http://www.squid-cache.org/Advisories/SQUID-2007_2.txt
This is CVE-2007-6239[1].
> Will there be a patch für Debian Etch?
Etch and Sarge are vulnerable, the issue is known to the squid
maintainer and the security team[2].
1. http
Hello!
http://www.squid-cache.org/Advisories/SQUID-2007_2.txt
Will there be a patch für Debian Etch?
Thx Stefan
5 matches
Mail list logo