On Thu, Jan 28, 2010 at 12:37:52PM +0100, Steffen Joeris wrote:
For the stable distribution (lenny), this problem has been fixed in
version 2.0.4-3+lenny1.
This update appears to have dropped the hard dependency on courier-authlib. As
a result, mail starts bouncing.
--
Antti-Juhani Kaijanaho
Frans Pop wrote:
On Monday 29 August 2005 22:23, Florian Weimer wrote:
I've obtained permission from tbm to quote the message reproduced
below in public. This should make it clear that the intent was to
delegate: Nach [URL] hat debian-admin klar die Authorität --
according to [URL],
, a
configuration file will be able to specify arbitrary shell commands to
be executed without the user noticing it. My problem is, does this
create a security problem.
http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/file-contents.html
Thanks for that link.
--
Antti-Juhani Kaijanaho, Debian
, a
configuration file will be able to specify arbitrary shell commands to
be executed without the user noticing it. My problem is, does this
create a security problem.
http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/file-contents.html
Thanks for that link.
--
Antti-Juhani Kaijanaho, Debian
-writable for some reason (it isn't by design, of course),
a malicious local user can add code that will be executed as root when
root next runs grep-available.
In your opinion, is there any potential for a security problem in this
scheme? If there is, what should I do about it?
--
Antti-Juhani
-writable for some reason (it isn't by design, of course),
a malicious local user can add code that will be executed as root when
root next runs grep-available.
In your opinion, is there any potential for a security problem in this
scheme? If there is, what should I do about it?
--
Antti-Juhani
6 matches
Mail list logo