[EMAIL PROTECTED](Stephen Gran)  19.09.05 08:58

>This one time, at band camp, Rainer Zocholl said:
>> Hello
>>
>> it happend that i can't update clamav on a box.
>>
>> That was caused by the line
>>
>> # cat apt.conf
>> Apt::Default-Release "stable";
>>
>>
>>
>> aptitude remove clamav clamv-base ....,
>> aptitude clean
>> aptitude install
>>
>> shows:
>>
>> Get:1 http://security.debian.org stable/updates/main libclamav1
>> 0.84-2.sarge.2 [252kB]
>> Get:2 http://security.debian.org stable/updates/main clamav-base
>> 0.84-2.sarge.2 [154kB]
>> Get:3 http://security.debian.org stable/updates/main
>> clamav-freshclam 0.84-2.sarge.2 [2171kB]
>>
>> Why is such an old and broken version still on *security* ?
>>
>> Current version is 0.87(!) and all version below 0.86 are remote
>> exploidable.

>Debian backports security fixes, rather than upgrading to new versions
>with new bugs.

Jepp.

>All of the remote bugs have been fixed 
>in 0.84-2sarge.2.

How can i "check"/validate that debians security 0.84 is as secure as 
"volatile" 0.86/0.87?

>(except a few that are only just fixed in 0.87) 

Em,..  jepp.

>If you want to
>use a newer version of the software, please have a look at

>http://volatile.debian.net

I know that.

Thanks. But a way to determine what "flaws" are fixed would be nice.


Rainer---<=====>                         Vertraulich
             //
           //                              
         <=====>--------------ocholl, Kiel, Germany ------------



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to