From 88070b3a0ca9b285e1c2cf62906047ba8ca378b8 Mon Sep 17 00:00:00 2001 From: Stefan Fritsch Date: Wed, 23 May 2007 06:34:51 +0000 Subject: fix some more references to etch git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@5903 e39458fd-73e7-0310-bf30-c45bca0a0e42 --- website/DTSA/DTSA-35-1.html | 2 +- website/DTSA/DTSA-36-1.html | 2 +- website/DTSA/DTSA-37-1.html | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) (limited to 'website') diff --git a/website/DTSA/DTSA-35-1.html b/website/DTSA/DTSA-35-1.html index ee4baf7ebf..5f759ce437 100644 --- a/website/DTSA/DTSA-35-1.html +++ b/website/DTSA/DTSA-35-1.html @@ -57,7 +57,7 @@ insufficient validation of 802.11 authentication packets, which allows the  
execution of arbitrary code. 
-
For the testing distribution (etch) this is fixed in version 1:0.8-0.1lenny1
+
For the testing distribution (lenny) this is fixed in version 1:0.8-0.1lenny1
For the unstable distribution (sid) this is fixed in version 1:0.7-3

This upgrade is recommended if you use aircrack-ng.

If you have the secure testing lines in your sources.list, you can update by running this command as root:
diff --git a/website/DTSA/DTSA-36-1.html b/website/DTSA/DTSA-36-1.html index fb7f120fdb..b481c3963d 100644 --- a/website/DTSA/DTSA-36-1.html +++ b/website/DTSA/DTSA-36-1.html @@ -56,7 +56,7 @@
Multiple buffer overflows in MyDNS allow remote attackers to cause a denial of  
service (daemon crash) and possibly execute arbitrary code. 
-
For the testing distribution (etch) this is fixed in version 1:1.1.0-7.1lenny1
+
For the testing distribution (lenny) this is fixed in version 1:1.1.0-7.1lenny1
For the unstable distribution (sid) this is fixed in version 1:1.1.0-8

This upgrade is recommended if you use mydns.

If you have the secure testing lines in your sources.list, you can update by running this command as root:
diff --git a/website/DTSA/DTSA-37-1.html b/website/DTSA/DTSA-37-1.html index 07e1832396..dbc885a9bf 100644 --- a/website/DTSA/DTSA-37-1.html +++ b/website/DTSA/DTSA-37-1.html @@ -71,7 +71,7 @@ CVE-2007-2029  
It was discovered that a file descriptor leak in the PDF handler may lead to  
denial of service. 
-
For the testing distribution (etch) this is fixed in version 0.90.1-3lenny2
+
For the testing distribution (lenny) this is fixed in version 0.90.1-3lenny2
For the unstable distribution (sid) this is fixed in version 0.90.2-1

This upgrade is recommended if you use clamav.

If you have the secure testing lines in your sources.list, you can update by running this command as root:
-- cgit v1.2.3