On Sun, Aug 01, 2004 at 12:48:40PM -0400, James R. Van Zandt wrote:
>Anibal -
>
>Well, between hardware problems, other interests, and Debian host
>downtime, I know I have not been keeping up as I should. I didn't
>think it had been a *year*. (In fact, I have a file
>adjtimex_1.17-1_i386.upload d
Anibal -
Well, between hardware problems, other interests, and Debian host
downtime, I know I have not been keeping up as I should. I didn't
think it had been a *year*. (In fact, I have a file
adjtimex_1.17-1_i386.upload dated in April although I see that version
never made it into the archive.
On Sun, Aug 01, 2004 at 12:05:12PM +0200, J.H.M. Dassen (Ray) wrote:
> If cups-pdf invoked on behalf of a regular user is actually run with root
> privileges (I haven't checked), then -dSAFER only alleviates the security
> problems resulting from that situation, but it certainly doesn't end them,
Hello,
Collect $20 to gamble with our internet casino, Allow us to show you our
quality operation.
Type in: gaming-money.biz in your address bar,
at the software cashier type in coupon code: FR93P
Collect two hundred dollars on your first transaction
Type in: gaming-money.biz in your address ba
> I completely agree with Matt. This was the idea I wanted to say in my
> former post. Don't mix development docs (like changelog) with security ones
> (security advisories, etc). IMHO, the correct procedure for
> SquirrelMail (or other important project) would be to open a security
> section where
On Sat, 31 Jul 2004 21:53:25 -0700, you wrote:
>The Debian security team cannot monitor the mailing lists for every project
>in Debian: there are literally thousands. We rely on channels which are
>explicitly devoted to the dissemination of security announcements (e.g.,
>BUGTRAQ), and communicati
On Sun, Aug 01, 2004 at 11:13:44 +0300, Martin-Éric Racine wrote:
> On Sat, 31 Jul 2004, Matt Zimmerman wrote:
> > That is, an attacker could submit a print job containing PostScript
> > commands which, when interpreted by gs, would open files, etc. with the
> > privileges of cups-pdf (apparently,
On Sat, 31 Jul 2004, Matt Zimmerman wrote:
> > > > [Florian]
> > > > l.s 69, 409 and 416:
> > > > gs invoked this way allows any file operations
> > [Upstream]
> > True, but call is managed by the cups-pdf binary. I.e. as long as no bug
> > allows insertion of malicious code into the syste
Howdy,
Get 20 dollars credit to try our online gambling den, No deposit is necessary.
Enter: gaming-money.biz in your web browser,
at the cashier enter bonus code: FR93P
Collect $200 on your first deposit
Copy: gaming-money.biz in your address bar,
at the software cashier enter bonus code: FMJK
Hi,
> How about splitting off the purely security-related part of this thread
> to debian-security, as suggested by Frank?
I just noticed that the maintainer already has started a thread on this
on debian-security, so I'd suggest discussing the security issues
there.
| Subject: advice needed on
10 matches
Mail list logo