Re: JULY 6th Lead Training 3 tips for working leads

2004-07-28 Thread ALISA743
I purchased leads from you and half of them were duplicates.  I need a replacement as soon as possible.   Warm Regards,Alisa Hendersonhttp://www.achbiz.comHelping Individuals Achieve DreamsProverbs 16:3http://www.intouch.org

List of important news from UsaVity LLC.

2004-07-28 Thread Jermaine
Dear CheapSoft Customer, My name is Marta Aguirre, and I work at CheapSoft LLC. You are important to me! You spend your money and time on CheapSoft, and I want to let you know that we have finished update our programs store. I want to remind you that we are offering now more than 1500 popular so

Re: PaX on Debian (Demo setup)

2004-07-28 Thread John Richard Moser
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I've got a chunk of data that can be used for a demo setup over here. I would like the help of any debian developers that would like to package up a set of kernels and the scripts that come with this and place them in a mini-repository, to give the dev

Собака-Волк

2004-07-28 Thread Нина Венцеславна
Еще один шаг к полной защите. http://www.dazer2.ru -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: init scripts and su

2004-07-28 Thread Giacomo A. Catenazzi
Russell Coker wrote: On Tue, 27 Jul 2004 07:48, Andrew Pimlott <[EMAIL PROTECTED]> wrote: Maybe your changes should happen in su by default, with a --leak-tty option if you want to keep the terminal. I can't imagine us changing the way su works by default. The only way to make "su user" not have

coreutils/fileutils : 'dir' integer overflow vulnerability on woody

2004-07-28 Thread Christophe Chisogne
A bug report about a vulnerability of 'dir' [1] in package coreutils says it "was fixed upstream in coreutils-5.1.0, and the latest is coreutils-5.2.0" but Debian/woody is vulnerable (dir is in woody package fileutils). I just filed a bug [2] for fileutils on woody, and I'm posting here because it'

Re: [d-security] Re: [SECURITY] [DSA 532-1] New libapache-mod-ssl packages fix multiple vulnerabilities

2004-07-28 Thread elijah wright
> * elijah wright <[EMAIL PROTECTED]> [040727 19:40]: > > and it probably would have been fine, if you'd been running a stock > > config. > > If things only have to be fine when using a stock config, why not > abolish all those limiting rules about /etc and just disallow the use to > cope with it

Re: init scripts and su

2004-07-28 Thread Andrew Pimlott
On Wed, Jul 28, 2004 at 04:56:20PM +1000, Russell Coker wrote: > On Tue, 27 Jul 2004 07:48, Andrew Pimlott <[EMAIL PROTECTED]> wrote: > > If this is a real problem (which it sounds like), it's not specific to > > init scripts. Shouldn't it be fixed in su? > > Ideally yes. But that involves proxy

Re: init scripts and su

2004-07-28 Thread Russell Coker
On Tue, 27 Jul 2004 07:48, Andrew Pimlott <[EMAIL PROTECTED]> wrote: > > During the time between the daemon launch and it closing it's file > > handles and calling setsid(2) (which some daemons don't do because they > > are buggy) any other code running in the same UID could take over the > > proce

Re: [d-security] Re: [SECURITY] [DSA 532-1] New libapache-mod-ssl packages fix multiple vulnerabilities

2004-07-28 Thread Bernhard R. Link
* elijah wright <[EMAIL PROTECTED]> [040727 19:40]: > and it probably would have been fine, if you'd been running a stock > config. If things only have to be fine when using a stock config, why not abolish all those limiting rules about /etc and just disallow the use to cope with it directly and k