summaryrefslogtreecommitdiffstats
path: root/website/DTSA/DTSA-36-1.html
diff options
context:
space:
mode:
authorStefan Fritsch <sf@sfritsch.de>2007-05-23 06:34:51 +0000
committerStefan Fritsch <sf@sfritsch.de>2007-05-23 06:34:51 +0000
commit88070b3a0ca9b285e1c2cf62906047ba8ca378b8 (patch)
tree9db1a3313b1a977b6a312672097e4b5a2e9c4dd5 /website/DTSA/DTSA-36-1.html
parentdea1226cdc98403ef42a838d9aa1f48ec1659539 (diff)
fix some more references to etch
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@5903 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'website/DTSA/DTSA-36-1.html')
-rw-r--r--website/DTSA/DTSA-36-1.html2
1 files changed, 1 insertions, 1 deletions
diff --git a/website/DTSA/DTSA-36-1.html b/website/DTSA/DTSA-36-1.html
index fb7f120fdb..b481c3963d 100644
--- a/website/DTSA/DTSA-36-1.html
+++ b/website/DTSA/DTSA-36-1.html
@@ -56,7 +56,7 @@
<dd>Multiple buffer overflows in MyDNS allow remote attackers to cause a denial of &nbsp;<br>
service (daemon crash) and possibly execute arbitrary code.&nbsp;<br>
</dd>
-<br><dt>For the testing distribution (etch) this is fixed in version 1:1.1.0-7.1lenny1</dt>
+<br><dt>For the testing distribution (lenny) this is fixed in version 1:1.1.0-7.1lenny1</dt>
<dt>For the unstable distribution (sid) this is fixed in version 1:1.1.0-8</dt>
<br><dt>This upgrade is recommended if you use mydns.<dt>
<br><dt>If you have the secure testing lines in your sources.list, you can update by running this command as root:</dt>

© 2014-2024 Faster IT GmbH | imprint | privacy policy