diff options
author | Stefan Fritsch <sf@sfritsch.de> | 2007-05-23 06:34:51 +0000 |
---|---|---|
committer | Stefan Fritsch <sf@sfritsch.de> | 2007-05-23 06:34:51 +0000 |
commit | 88070b3a0ca9b285e1c2cf62906047ba8ca378b8 (patch) | |
tree | 9db1a3313b1a977b6a312672097e4b5a2e9c4dd5 /website/DTSA/DTSA-36-1.html | |
parent | dea1226cdc98403ef42a838d9aa1f48ec1659539 (diff) |
fix some more references to etch
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@5903 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'website/DTSA/DTSA-36-1.html')
-rw-r--r-- | website/DTSA/DTSA-36-1.html | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/website/DTSA/DTSA-36-1.html b/website/DTSA/DTSA-36-1.html index fb7f120fdb..b481c3963d 100644 --- a/website/DTSA/DTSA-36-1.html +++ b/website/DTSA/DTSA-36-1.html @@ -56,7 +56,7 @@ <dd>Multiple buffer overflows in MyDNS allow remote attackers to cause a denial of <br> service (daemon crash) and possibly execute arbitrary code. <br> </dd> -<br><dt>For the testing distribution (etch) this is fixed in version 1:1.1.0-7.1lenny1</dt> +<br><dt>For the testing distribution (lenny) this is fixed in version 1:1.1.0-7.1lenny1</dt> <dt>For the unstable distribution (sid) this is fixed in version 1:1.1.0-8</dt> <br><dt>This upgrade is recommended if you use mydns.<dt> <br><dt>If you have the secure testing lines in your sources.list, you can update by running this command as root:</dt> |