Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-maximum-upload-file-size domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/news.numlock.ch/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the math-captcha domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/news.numlock.ch/public_html/wp-includes/functions.php on line 6114
once again – A changelog by Daniel Mettler

once again

openssh < v3.7 is vulnerable. nice to know that this server has buffer-overflow protection ;)

the gentoo devs will soon release an updated openssh ebuild.

hm.. i wonder whether i should upgrade to kernel 2.6.0-test5 to get some better performance as well :)

[update 20030917: the first patch doesn’t fix it yet, thus update openssh to v3.7.1. “once again” also applies to windows. both won’t be the last vulnerabilities of their kinds for sure..]

CategoriesITTags

Leave a Reply

Your email address will not be published. Required fields are marked *

53 − = 51

This site uses Akismet to reduce spam. Learn how your comment data is processed.