[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040414225231.GA16378@piper.madduck.net>
From: madduck at madduck.net (martin f krafft)
Subject: Re: 1 patch for 1 vulnerabiliy for Linux and BSD? gunna try and sell us a bridge now too?
also sprach Exibar <exibar@...lair.com> [2004.04.14.2218 +0200]:
> are you kidding me? for years and years all I've heard from *nix
> people is how secure the OS is and that there aren't as many
> patches needed for it and if a vuln is found a patch is released
> right away....
I don't see why Debian should subject their users to having to
download multiple kernels when a couple of patches can be applied to
one updated release.
Aside from that, have you looked at the actual bugs? First, they are
very clearly contained, and second, they don't exactly affect the
majority, do they?
--
martin; (greetings from the heart of the sun.)
\____ echo mailto: !#^."<*>"|tr "<*> mailto:" net@...duck
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
"never speak disrespectfully of society.
only people who can't get into it do that."
-- oscar wilde
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040415/eeb01571/attachment.bin
Powered by blists - more mailing lists