On Fri, 28 Sep 2007 08:39:13 pm Ionut Georgescu wrote:
> On Thu, 2007-09-27 at 20:12 +0200, Torsten Werner wrote:
> > On 9/17/07, Torsten Werner <[EMAIL PROTECTED]> wrote:
> > > On 9/16/07, Artur R. Czechowski <[EMAIL PROTECTED]> wrote:
> > > > The t1lib 5.1.0 available in Debian (either etch as le
On Thu, 2007-09-27 at 20:12 +0200, Torsten Werner wrote:
> On 9/17/07, Torsten Werner <[EMAIL PROTECTED]> wrote:
> > On 9/16/07, Artur R. Czechowski <[EMAIL PROTECTED]> wrote:
> > > The t1lib 5.1.0 available in Debian (either etch as lenny and sid[1]) is
> > > vulnerable to CVE-2007-4033 security f
On 9/17/07, Torsten Werner <[EMAIL PROTECTED]> wrote:
> On 9/16/07, Artur R. Czechowski <[EMAIL PROTECTED]> wrote:
> > The t1lib 5.1.0 available in Debian (either etch as lenny and sid[1]) is
> > vulnerable to CVE-2007-4033 security flaw.
>
> I have uploaded a new package to unstable that can be ea
Hi,
On 9/16/07, Artur R. Czechowski <[EMAIL PROTECTED]> wrote:
> The t1lib 5.1.0 available in Debian (either etch as lenny and sid[1]) is
> vulnerable to CVE-2007-4033 security flaw.
I have uploaded a new package to unstable that can be easily
backported to etch/lenny. I am attaching the output o
forwarded 439927 [EMAIL PROTECTED]
tag 439927 patch confirmed upstream
severity 439927 serious
found 439927 5.1.0-2
thanks
Hi,
The t1lib 5.1.0 available in Debian (either etch as lenny and sid[1]) is
vulnerable to CVE-2007-4033 security flaw.
Upstream version 5.1.1 is vulnerable too. Upstream has
5 matches
Mail list logo