lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200307170418.h6H4ITH24980@rooster.cisco.com>
From: jnduncan at cisco.com (Jim Duncan)
Subject: Cisco Code Train matrix (mystery IOS vulnerability) 

Len Rose writes:
> See http://www.0ptical.net/cisco.html for the versions that
> are affected and which version you should upgrade to.

Please don't do that.  The best thing is to read the official copy of 
the advisory at http://www.cisco.com/go/psirt

The copy you cite is pirated and might not be correct.  It certainly 
won't be updated automatically.  Anyone relying on it might not get the 
best information.

Disclaimer: I am no longer a member of the PSIRT team, but I am well 
aware of the impact from out-of-date cached copies of advisories.

Thanks.

	Jim



==
Jim Duncan, Critical Infrastructure Assurance Group, Cisco Systems, Inc.
jnduncan@...co.com, +1 919 392 6209, http://www.cisco.com/go/ciag/.
PGP: DSS 4096/1024 E09E EA55 DA28 1399 75EB D6A2 7092 9A9C 6DC3 1821




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ