-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yes, good luck with that also!!

You would probably do a better job than what is going on right now...

pipo


On 05/11/2015 04:52 PM, Jason M. Burds wrote:
>
> Good luck with that.
>
> 
>
> *Jason Burds*
>
> I.T. Supervisor
>
> Carnegie-Stout Public Library <http://www.dubuque.lib.ia.us/>
>
> (563)589-4229
>
> 
>
> *From:*Johannes Wolpers [mailto:[email protected]]
> *Sent:* Monday, May 11, 2015 3:33 PM
> *To:* [email protected]
> *Cc:* [email protected]
> *Subject:* bitches kann kiss my ass
>
> 
>
> I will dominate this world one day
>
> 
>
> *Gesendet:* Montag, 11. Mai 2015 um 22:05 Uhr
> *Von:* "Salvatore Bonaccorso" <[email protected]
<mailto:[email protected]>>
> *An:* [email protected]
<mailto:[email protected]>
> *Betreff:* [SECURITY] [DSA 3257-1] mercurial security update
>
> -------------------------------------------------------------------------
> Debian Security Advisory DSA-3257-1 [email protected]
<mailto:[email protected]>
> http://www.debian.org/security/ Salvatore Bonaccorso
> May 11, 2015 http://www.debian.org/security/faq
> -------------------------------------------------------------------------
>
> Package : mercurial
> CVE ID : CVE-2014-9462
> Debian Bug : 783237
>
> Jesse Hertz of Matasano Security discovered that Mercurial, a
> distributed version control system, is prone to a command injection
> vulnerability via a crafted repository name in a clone command.
>
> For the oldstable distribution (wheezy), this problem has been fixed in
> version 2.2.2-4+deb7u1. This update also includes a fix for
> CVE-2014-9390 previously scheduled for the next wheezy point release.
>
> For the stable distribution (jessie), this problem has been fixed in
> version 3.1.2-2+deb8u1.
>
> For the unstable distribution (sid), this problem has been fixed in
> version 3.4-1.
>
> We recommend that you upgrade your mercurial packages.
>
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: https://www.debian.org/security/
>
> Mailing list: [email protected]
<mailto:[email protected]>
>
>
> --
> To UNSUBSCRIBE, email to
[email protected]
<mailto:[email protected]>
> with a subject of "unsubscribe". Trouble? Contact
[email protected] <mailto:[email protected]>
> Archive: https://lists.debian.org/[email protected]
> 
>
> 
>
> Click here <https://www.mailcontrol.com/sr/MZbqvYs5QwJvpeaetUwhCQ==>
to report this email as spam.
>
> -- To UNSUBSCRIBE, email to [email protected]
<mailto:[email protected]> with a subject of
"unsubscribe". Trouble? Contact [email protected]
<mailto:[email protected]> Archive:
https://lists.debian.org/trinity-e0570acb-0124-40c7-8393-ac79e4b864d3-1431376383081@3capp-gmx-bs16
>
>
>
> This message has been scanned for malware by Websense.
www.websense.com <http://www.websense.com/>
>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Icedove - http://www.enigmail.net/

iEYEARECAAYFAlVRONsACgkQqi0WYaKZBeylgwCgs8ZJJs2/QlRd/ccUhXotkK3X
NDgAn1+Nc/Imal5wNKzQOXGag/oUOzeE
=DXJZ
-----END PGP SIGNATURE-----

Reply via email to