Just a guess, they looked at Debian, saw that the version numbers weren't current, and assumed that Debian didn't update the software. Debian security team backports security patches to the version of the software currently in stable. (They're crazy...) Hard to say without specific examples. Andrew S. Zbikowski | http://www.ringworld.org A password is like your underwear; Change it frequently, don't share it with others, and don't ask to borrow someone else's. On Mon, 22 Mar 2004, Bob Tanner wrote: | http://www.linuxworld.com.au/index.php/id;1607539824;fp;2;fpid;1 | | "For example, Debian (Debian GNU/Linux) has left vulnerabilities there and | didn't release any patches for them." | | | Ok, I really find this hard to believe. Any debian developers want to comment on | this and/or push it up to debian mailing lists? | | | -- | Bob Tanner <tanner at mn-linux.org> | Phone : (952)943-8700 | http://www.mn-linux.org, Minnesota, Linux | Fax : (952)943-8500 | http://www.linuxjustworks.com | Linux Just Works! | Key fingerprint = AB15 0BDF BCDE 4369 5B42 1973 7CF1 A709 2CC1 B288 | | _______________________________________________ | TCLUG Mailing List - Minneapolis/St. Paul, Minnesota | http://www.mn-linux.org tclug-list at mn-linux.org | https://mailman.real-time.com/mailman/listinfo/tclug-list | | | !DSPAM:405f637a252082582616876! | | _______________________________________________ TCLUG Mailing List - Minneapolis/St. Paul, Minnesota http://www.mn-linux.org tclug-list at mn-linux.org https://mailman.real-time.com/mailman/listinfo/tclug-list