On 10/30/07, Rob Tucker <[EMAIL PROTECTED]> wrote: > This must be more than coincidence. Im trying to think of what we must have > all done the same to get to this point.
Around three weeks ago, the following updates were introducted to etch [1]: [09 Oct 2007] DSA-1385 xfs - several vulnerabilities [05 Oct 2007] DSA-1384 xen-utils - several vulnerabilities [04 Oct 2007] DSA-1383 gforge - cross site scripting [01 Oct 2007] DSA-1382 quagga - null pointer dereference [02 Oct 2007] DSA-1381 linux-2.6 - several vulnerabilities [02 Oct 2007] DSA-1380 elinks - programming error [02 Oct 2007] DSA-1379 openssl - off-by-one error/buffer overflow There was also a kernel update on September 28: [28 Sep 2007] DSA-1378 linux-2.6 - several vulnerabilities Gordon [1] http://www.debian.org/security/2007/ -- Gordon Farquharson GnuPG Key ID: 32D6D676 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

