Re: Preparation of Debian GNU/Linux 3.0r2
- To: debian-devel@lists.debian.org
- Subject: Re: Preparation of Debian GNU/Linux 3.0r2
- From: Peter Makholm <peter@makholm.net>
- Date: Tue, 09 Sep 2003 22:31:33 +0200
- Message-id: <[🔎] 874qzlog9m.fsf@xyzzy.adsl.dk>
- In-reply-to: <20030909164227.GI783@finlandia.infodrom.north.de> (Martin Schulze's message of "Tue, 9 Sep 2003 18:42:27 +0200")
- References: <20030909164227.GI783@finlandia.infodrom.north.de>
Martin Schulze <joey@infodrom.org> writes:
> An up-to-date version is at <http://master.debian.org/~joey/3.0r2/>.
If you want the DSA numers for documentation purpose, here is some
missing:
> slashem stable 0.0.6E4F8-4.0woody1 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source
> slashem updates 0.0.6E4F8-4.0woody3 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source
>
> Security update by the Security Team with missing DSA
And this was DSA 316-2
> jnethack stable 1.1.5-11 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source
> jnethack updates 1.1.5-11woody2 alpha arm hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source
>
> Security update: buffer overflow
This was DSA 316-3
And nethack was fixed, as you have it, by DSA 316-1.
--
Peter Makholm | Why does the entertainment industry wants us to
peter@makholm.net | believe that a society base on full surveillance
http://hacking.dk | is bad?
| Do they have something to hide?
Reply to: