diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2011-02-02 21:02:23 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2011-02-02 21:02:23 +0000 |
commit | 44a87377d22e53ee13940a0157315311e6b4e894 (patch) | |
tree | 32d35f20f0499b81ccce1d4edef76719d5370f45 /data/package-tags | |
parent | a81d73ed8f01fb21e6a1d24aeea6ebcf4d927505 (diff) |
update on package-tags file:
add adns for squeeze
remove vmware-package, which has been removed
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@16041 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/package-tags')
-rw-r--r-- | data/package-tags | 8 |
1 files changed, 6 insertions, 2 deletions
diff --git a/data/package-tags b/data/package-tags index 6cb54e59cb..019ffac8b8 100644 --- a/data/package-tags +++ b/data/package-tags @@ -11,12 +11,11 @@ [squeeze] php5 <limited-support> (See README.Debian.security for the PHP security policy) [lenny] adns <limited-support> (Stub resolver that should only be used with trusted recursors) +[squeeze] adns <limited-support> (Stub resolver that should only be used with trusted recursors) [lenny] ltp <limited-support> (Testsuite, only supported on non-production non-multiuser systems) [squeeze] ltp <limited-support> (Testsuite, only supported on non-production non-multiuser systems) -[sid] vmware-package <unsupported> (Only a build script for native upstream tarballs, not supported) - [lenny] clamav <unsupported> (No signature updates anymore, should be taken from volatile) [sid] kompozer <unsupported> (vulnerable to all xulrunner issues, but intended use is not for untrusted or networked sources) @@ -36,3 +35,8 @@ [lenny] memcached <limited-support> (Attacks that require an attacker to be able to access the memcached port/sock are not supported, it's running as nobody and in a typical setup attackers don't have access to this) [squeeze] memcached <limited-support> (Attacks that require an attacker to be able to access the memcached port/sock are not supported, it's running as nobody and in a typical setup attackers don't have access to this) + + + + + |