-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Yes, good luck with that also!! You would probably do a better job than what is going on right now... pipo On 05/11/2015 04:52 PM, Jason M. Burds wrote: > > Good luck with that. > > > > *Jason Burds* > > I.T. Supervisor > > Carnegie-Stout Public Library <http://www.dubuque.lib.ia.us/> > > (563)589-4229 > > > > *From:*Johannes Wolpers [mailto:johanneswolpers@gmx.net] > *Sent:* Monday, May 11, 2015 3:33 PM > *To:* debian-security@lists.debian.org > *Cc:* debian-security-announce@lists.debian.org > *Subject:* bitches kann kiss my ass > > > > I will dominate this world one day > > > > *Gesendet:* Montag, 11. Mai 2015 um 22:05 Uhr > *Von:* "Salvatore Bonaccorso" <carnil@debian.org <mailto:carnil@debian.org>> > *An:* debian-security-announce@lists.debian.org <mailto:debian-security-announce@lists.debian.org> > *Betreff:* [SECURITY] [DSA 3257-1] mercurial security update > > ------------------------------------------------------------------------- > Debian Security Advisory DSA-3257-1 security@debian.org <mailto:security@debian.org> > http://www.debian.org/security/ Salvatore Bonaccorso > May 11, 2015 http://www.debian.org/security/faq > ------------------------------------------------------------------------- > > Package : mercurial > CVE ID : CVE-2014-9462 > Debian Bug : 783237 > > Jesse Hertz of Matasano Security discovered that Mercurial, a > distributed version control system, is prone to a command injection > vulnerability via a crafted repository name in a clone command. > > For the oldstable distribution (wheezy), this problem has been fixed in > version 2.2.2-4+deb7u1. This update also includes a fix for > CVE-2014-9390 previously scheduled for the next wheezy point release. > > For the stable distribution (jessie), this problem has been fixed in > version 3.1.2-2+deb8u1. > > For the unstable distribution (sid), this problem has been fixed in > version 3.4-1. > > We recommend that you upgrade your mercurial packages. > > Further information about Debian Security Advisories, how to apply > these updates to your system and frequently asked questions can be > found at: https://www.debian.org/security/ > > Mailing list: debian-security-announce@lists.debian.org <mailto:debian-security-announce@lists.debian.org> > > > -- > To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org <mailto:debian-security-announce-REQUEST@lists.debian.org> > with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org <mailto:listmaster@lists.debian.org> > Archive: https://lists.debian.org/E1Yrtx7-0008CK-FY@master.debian.org > > > > > Click here <https://www.mailcontrol.com/sr/MZbqvYs5QwJvpeaetUwhCQ==> to report this email as spam. > > -- To UNSUBSCRIBE, email to debian-security-REQUEST@lists.debian.org <mailto:debian-security-REQUEST@lists.debian.org> with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org <mailto:listmaster@lists.debian.org> Archive: [🔎] trinity-e0570acb-0124-40c7-8393-ac79e4b864d3-1431376383081@3capp-gmx-bs16">https://lists.debian.org/[🔎] trinity-e0570acb-0124-40c7-8393-ac79e4b864d3-1431376383081@3capp-gmx-bs16 > > > > This message has been scanned for malware by Websense. www.websense.com <http://www.websense.com/> > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Icedove - http://www.enigmail.net/ iEYEARECAAYFAlVRONsACgkQqi0WYaKZBeylgwCgs8ZJJs2/QlRd/ccUhXotkK3X NDgAn1+Nc/Imal5wNKzQOXGag/oUOzeE =DXJZ -----END PGP SIGNATURE----- |