Just a guess, they looked at Debian, saw that the version numbers weren't
current, and assumed that Debian didn't update the software. Debian
security team backports security patches to the version of the software
currently in stable. (They're crazy...)

Hard to say without specific examples.

Andrew S. Zbikowski | http://www.ringworld.org
 A password is like your underwear; Change it
 frequently, don't share it with others, and
     don't ask to borrow someone else's.

On Mon, 22 Mar 2004, Bob Tanner wrote:

| http://www.linuxworld.com.au/index.php/id;1607539824;fp;2;fpid;1
|
| "For example, Debian (Debian GNU/Linux) has left vulnerabilities there and
| didn't release any patches for them."
|
|
| Ok, I really find this hard to believe. Any debian developers want to comment on
| this and/or push it up to debian mailing lists?
|
|
| --
| Bob Tanner <tanner at mn-linux.org>          | Phone : (952)943-8700
| http://www.mn-linux.org, Minnesota, Linux | Fax   : (952)943-8500
| http://www.linuxjustworks.com             | Linux Just Works!
| Key fingerprint = AB15 0BDF BCDE 4369 5B42  1973 7CF1 A709 2CC1 B288
|
| _______________________________________________
| TCLUG Mailing List - Minneapolis/St. Paul, Minnesota
| http://www.mn-linux.org tclug-list at mn-linux.org
| https://mailman.real-time.com/mailman/listinfo/tclug-list
|
|
| !DSPAM:405f637a252082582616876!
|
|


_______________________________________________
TCLUG Mailing List - Minneapolis/St. Paul, Minnesota
http://www.mn-linux.org tclug-list at mn-linux.org
https://mailman.real-time.com/mailman/listinfo/tclug-list