From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Date: Thu, 9 Oct 2003 13:08:03 +0400 From: "Dmitry V. Levin" To: ALT Devel discussion list Subject: Re: [devel] sec Updates for 2.x Message-ID: <20031009090803.GF22124@basalt.office.altlinux.org> Mail-Followup-To: ALT Devel discussion list References: <20031009125556.4ef56a98.xmm@altlinux.ru> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="uTRFFR9qmiCqR05s" Content-Disposition: inline In-Reply-To: <20031009125556.4ef56a98.xmm@altlinux.ru> X-fingerprint: 9658 398D 181B 1200 8FC5 26B8 F6F8 846B C1E2 3429 X-BeenThere: devel@altlinux.ru X-Mailman-Version: 2.1.2 Precedence: list Reply-To: ALT Devel discussion list List-Id: ALT Devel discussion list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2003 09:08:05 -0000 Archived-At: List-Archive: List-Post: --uTRFFR9qmiCqR05s Content-Type: text/plain; charset=koi8-r Content-Disposition: inline Content-Transfer-Encoding: 8bit On Thu, Oct 09, 2003 at 12:55:56PM +0400, Marat Khairullin wrote: > Будут ли обновления для ALTM2.2 и, особенно, Утес (2.0)? См. тж. http://www.altlinux.ru/pipermail/security-announce/2003-September/000091.html > http://www.linuxsecurity.com/advisories/debian_advisory-3618.html > Package : xfree86 > Vulnerability : buffer overflows, denial of service > Problem-Type : remote > Debian-specific: no > CVE Ids : CAN-2003-0063 CAN-2003-0071 CAN-2002-0164 CAN-2003-0730 pending, maintainer xfree86 анализирует. > PACKAGE : gtkhtml > http://www.linuxsecurity.com/advisories/connectiva_advisory-3617.html не будет, maintainer gtkhtml не проявил интереса. > PACKAGE : stunnel > http://www.linuxsecurity.com/advisories/connectiva_advisory-3603.html http://www.altlinux.ru/pipermail/security-announce/2003-August/000082.html > PACKAGE : php4 > http://www.linuxsecurity.com/advisories/connectiva_advisory-3684.html maintainer php4 проанализировал и не нашёл предмета для исправления. > PACKAGE : gdm > http://www.linuxsecurity.com/advisories/connectiva_advisory-3591.html maintainer gdm исправил и готовит анонс. -- ldv --uTRFFR9qmiCqR05s Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQE/hSVz9viEa8HiNCkRAkJTAJ4uGvNAAXTimS/5pObaXZIcsrEaKgCeIWyY rpUOlFJrWBBETALVxBjf2Vc= =9VlM -----END PGP SIGNATURE----- --uTRFFR9qmiCqR05s--