Pre-approved Application for debian-dpkg@lists.debian.org

2004-12-17 Thread Lara Stratton
Hello,
We sent you an email a while ago, because you now qualify for a new mortgage.
You could get $300,000 for as little as $600 a month!
Bad credit is no problem, you can pull cash out or refinance.

Please click on this link for free consultation by a mortgage broker:
Start Saving Here 

Best Regards,
Diann CrainFuture pref here



stuff that you requested

2004-12-17 Thread Herron
Title:





The Secret on How PORN STARS Grew Big DICKS !
The answer is here.

Turn off notifications here.

.

MM International 

Exports Ltd 
St.  #7701Belize City, 

Belize


.




Download christmas movies and songs -yq 0629 ahet

2004-12-17 Thread christmas music
Hello

Un limited
Music and MP 3 songs
Movies
Games
Software
TV Shows
Song Lyrics
Audio Books

Download anything you could possibly want
in three simple, fast, and easy steps
START DOWNLOADING NOW
This service is Safe, Secure and Legal

http://www.xmasdownloadnetwork.com/news.html

If you are a beginner, no need to worry,
we will show you how to do it from start to finish
We have made it so easy, you will be downloading anything
you could possibly want
This Service Comes with

More  Bonuses

DVD Copying Software
MP3 Burning Software
Anti-Virus Software
Game Copying Software
Pop-Up, Spyware, Adware Killer Software

http://www.xmasdownloadnetwork.com/news.html

Even More Benefits :

Latest FileSharing Software
In-Depth Visual Tutorials
Internet History Cleaner
Privacy Protection Software
Access to 9000 Songs
Unlimited Technical Support
Stay Legal  Do not Get Sued


Lifetime Membership is $34.95
Check out to Join Now and Start Downloading in Minutess

http://www.xmasdownloadnetwork.com/news.html


Regards
Orville Ramirez
Affilate Manager
Multimedia Download Center


Re: CAN-2004-1018, CAN-2004-1019 fixed in php4 (4:4.3.10-1), no DSA?

2004-12-17 Thread Joey Hess
Bob Tanner wrote:
> I see CAN-2004-1018, CAN-2004-1019 are fixed in php4 (4:4.3.10-1) which is in 
> unstable.
> 
> Wondering why I haven't seen a DSA for it yet.

CAN-2004-1018 is a rejected CAN. CAN-2004-1019 is marked as reserved in
mitre's database with no other info. Same for all the other CANs fixed
in the new php4 releases, they're all rejected or reserved. Rather strange..

Anyway, I suppose the delay with the stable package has somthing to do
with the advisory being released on Wednesday, and any of these CANs
that are real holes needing to be backported to the old version of php4
in stable.

-- 
see shy jo


signature.asc
Description: Digital signature


CAN-2004-1018, CAN-2004-1019 fixed in php4 (4:4.3.10-1), no DSA?

2004-12-17 Thread Bob Tanner
I see CAN-2004-1018, CAN-2004-1019 are fixed in php4 (4:4.3.10-1) which is in 
unstable.

Wondering why I haven't seen a DSA for it yet.

Thanks.

-- 
Bob Tanner <[EMAIL PROTECTED]>  | Phone : (952)943-8700
http://www.mn-linux.org, Minnesota, Linux | Fax   : (952)943-8500
Key fingerprint = AB15 0BDF BCDE 4369 5B42  1973 7CF1 A709 2CC1 B288


pgpK9hGbFoVv5.pgp
Description: PGP signature


Re: Samba 3.0.10 as Debian package -- and updating unstable

2004-12-17 Thread Andreas Metzler
Lukas Ruf <[EMAIL PROTECTED]> wrote:
> Is Samba 3.0.10 around as a release for Debian unstable and sarge?

No, not yet. I am sure the respective maintainers are working on it,
though.

[...]
> Btw. for the last two days I have not found any updates for unstable.
> Is this intended or a local misconfiguration?

Some part of the software taking care of installing stuff into the
archive and pushing mirroring it, broke. This has been fixed.
   cu andreas
-- 
"See, I told you they'd listen to Reason," [SPOILER] Svfurlr fnlf,
fuhggvat qbja gur juveyvat tha.
Neal Stephenson in "Snow Crash"
   http://downhill.aus.cc/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



[TADL Helpdesk #4035] AutoReply: [SECURITY] [DSA 610-1] New cscope packages fix insecure temporary file creation

2004-12-17 Thread Security Advisories via RT

Greetings,

This message has been automatically generated in response to the
creation of a trouble ticket regarding:
"[SECURITY] [DSA 610-1] New cscope packages fix insecure temporary file 
creation", 
a summary of which appears below.

There is no need to reply to this message right now.  Your ticket has been
assigned an ID of [TADL Helpdesk #4035].

Please include the string:

 [TADL Helpdesk #4035]

in the subject line of all future correspondence about this issue. To do so, 
you may reply to this message.

Thank you,
[EMAIL PROTECTED]

-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 610-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
December 17th, 2004 http://www.debian.org/security/faq
- --

Package: cscope
Vulnerability  : insecure temporary file
Problem-Type   : local
Debian-specific: no
CVE ID : CAN-2004-0996
BugTraq ID : 11697
Debian Bug : 282815

A vulnerability has been discovered in cscope, a program to
interactively examine C source code, which may allow local users to
overwrite files via a symlink attack.

For the stable distribution (woody) this problem has been fixed in
version 15.3-1woody2.

For the unstable distribution (sid) this problem has been fixed in
version 15.5-1.

We recommend that you upgrade your cscope package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- 

  Source archives:


http://security.debian.org/pool/updates/main/c/cscope/cscope_15.3-1woody2.dsc
  Size/MD5 checksum:  593 92a1d4fc455afa78d855f61032726cfb

http://security.debian.org/pool/updates/main/c/cscope/cscope_15.3-1woody2.diff.gz
  Size/MD5 checksum: 5750 2e991cad957c7fc76da2f6e05e02162d

http://security.debian.org/pool/updates/main/c/cscope/cscope_15.3.orig.tar.gz
  Size/MD5 checksum:   196580 7540514aab8c0a3737ee8dd08a5422ba

  Alpha architecture:


http://security.debian.org/pool/updates/main/c/cscope/cscope_15.3-1woody2_alpha.deb
  Size/MD5 checksum:   129904 55a18b826ab935a85ff9b1151d7058cf

  ARM architecture:


http://security.debian.org/pool/updates/main/c/cscope/cscope_15.3-1woody2_arm.deb
  Size/MD5 checksum:   111498 5da8a35ac3eaba039afa93ac1beba3ae

  Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/c/cscope/cscope_15.3-1woody2_i386.deb
  Size/MD5 checksum:   105106 9dc15376b2fafce9a63cdadae3784b35

  Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/c/cscope/cscope_15.3-1woody2_ia64.deb
  Size/MD5 checksum:   148664 9373976f2b1a14a165b71a04c3ed0c99

  HP Precision architecture:


http://security.debian.org/pool/updates/main/c/cscope/cscope_15.3-1woody2_hppa.deb
  Size/MD5 checksum:   121870 49f6e6a16ad6c9646b18a87790d775ca

  Motorola 680x0 architecture:


http://security.debian.org/pool/updates/main/c/cscope/cscope_15.3-1woody2_m68k.deb
  Size/MD5 checksum:   102290 428a0104834961d7e6fc8935d41653e3

  Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/c/cscope/cscope_15.3-1woody2_mips.deb
  Size/MD5 checksum:   119642 358d6239a38bc5d767ab3fceb4c4

  Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/c/cscope/cscope_15.3-1woody2_mipsel.deb
  Size/MD5 checksum:   119442 60c6abca0f605bf8efa6e0160716d351

  PowerPC architecture:


http://security.debian.org/pool/updates/main/c/cscope/cscope_15.3-1woody2_powerpc.deb
  Size/MD5 checksum:   114240 00df8d48376af2f93bda799ad9c95e16

  IBM S/390 architecture:


http://security.debian.org/pool/updates/main/c/cscope/cscope_15.3-1woody2_s390.deb
  Size/MD5 checksum:   10 c50a7ffc138d41c33ad6c7a7e768ff38

  Sun Sparc architecture:


http://security.debian.org/pool/updates/main/c/cscope/cscope_15.3-1woody2_sparc.deb
  Size/MD5 checksum:   115174 4e14738f98c36bb1cb7a6d1a63bfc688


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.d

Samba 3.0.10 as Debian package -- and updating unstable

2004-12-17 Thread Lukas Ruf
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Is Samba 3.0.10 around as a release for Debian unstable and sarge?

- From :

  16 December 2004

  Security Release: Samba 3.0.10 Available for Download

  Samba 3.0.10 is the latest stable release of Samba, and is
  the version that production servers should be running for all
  current bug-fixes. This is primarily a security release to address
  CAN-2004-1154. Please refer to the release notes for details regarding
  additional changes.

Btw. for the last two days I have not found any updates for unstable.
Is this intended or a local misconfiguration?

wbr,
Lukas
- -- 
Lukas Ruf   | Wanna know anything about raw |
 | IP? ->  |
eMail Style Guide: |
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFBwqbVXf8zDoH8+EURAuX7AJ4imFab0r4iUTzhC3lrRfDrUpFTpwCdG/tg
l2LXBiaMrBAsXdqSK25/fDk=
=8xOC
-END PGP SIGNATURE-