Hi Christos:
Am 25.11.2013 21:07, schrieb Christos Trochalakis:
> We are going to backport 1.4.4 as soon as it migrates to testing.
Thanks even more. :)
FYI: One serious data retention issue is a prime reason for using nginx
>= 1.3.7, thus bpo: OCSP stapling. (rfc4366) So presumably there are
ma
On Mon, Nov 25, 2013 at 08:37:20PM +0100, Kevin Price wrote:
Hi!
Thanks a lot for fixing this issue! Is there a chance that the still
vulnerable wheezy-backports will soon be either patched or updated?
(I know, security does not include bpo.)
patch: http://nginx.org/download/patch.2013.space.tx
Hi!
Thanks a lot for fixing this issue! Is there a chance that the still
vulnerable wheezy-backports will soon be either patched or updated?
(I know, security does not include bpo.)
patch: http://nginx.org/download/patch.2013.space.txt
update: 1.4.4 or 1.5.7 will do.
(reference:
http://mailman.n
3 matches
Mail list logo