[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Bad press related to (missing) Debian security



> At the same time, though, I think we need to take immediate action.
> Among the first steps would be the analysis of the status quo. I am
> going through the list of CVEs right now. There are *loads*. And
> I could need help. I'll ping out to joeyh to see if we could put his
> scripts for testing-security to any use.

Ah, thanks to the testing-security team:

  http://newraff.debian.org/~joeyh/demo.html

This list is about testing, but joeyh is adding
  http://newraff.debian.org/~joeyh/stable-security.html
right now.

Anyway, note that the situation seems to be under control already
and an announcement is under preparation. Therefore I apologise for
coming across a little hectical in my post.

-- 
Please do not send copies of list mail to me; I read the list!
 
 .''`.     martin f. krafft <madduck@debian.org>
: :'  :    proud Debian developer and author: http://debianbook.info
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!
 
"when faced with a new problem, the wise algorithmist
 will first attempt to classify it as np-complete.
 this will avoid many tears and tantrums as
 algorithm after algorithm fails."
                                                          -- g. niruta

Attachment: signature.asc
Description: Digital signature


Reply to: