Re: [SECURITY] [DSA 1981-1] New maildrop packages fix privilege escalation

2010-01-28 Thread Antti-Juhani Kaijanaho
On Thu, Jan 28, 2010 at 12:37:52PM +0100, Steffen Joeris wrote: For the stable distribution (lenny), this problem has been fixed in version 2.0.4-3+lenny1. This update appears to have dropped the hard dependency on courier-authlib. As a result, mail starts bouncing. -- Antti-Juhani Kaijanaho

Re: Bad press again...

2005-08-30 Thread Antti-Juhani Kaijanaho
Frans Pop wrote: On Monday 29 August 2005 22:23, Florian Weimer wrote: I've obtained permission from tbm to quote the message reproduced below in public. This should make it clear that the intent was to delegate: Nach [URL] hat debian-admin klar die Authorität -- according to [URL],

Re: Would this create a security problem?

2004-01-02 Thread Antti-Juhani Kaijanaho
, a configuration file will be able to specify arbitrary shell commands to be executed without the user noticing it. My problem is, does this create a security problem. http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/file-contents.html Thanks for that link. -- Antti-Juhani Kaijanaho, Debian

Re: Would this create a security problem?

2004-01-02 Thread Antti-Juhani Kaijanaho
, a configuration file will be able to specify arbitrary shell commands to be executed without the user noticing it. My problem is, does this create a security problem. http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/file-contents.html Thanks for that link. -- Antti-Juhani Kaijanaho, Debian

Would this create a security problem?

2004-01-01 Thread Antti-Juhani Kaijanaho
-writable for some reason (it isn't by design, of course), a malicious local user can add code that will be executed as root when root next runs grep-available. In your opinion, is there any potential for a security problem in this scheme? If there is, what should I do about it? -- Antti-Juhani

Would this create a security problem?

2004-01-01 Thread Antti-Juhani Kaijanaho
-writable for some reason (it isn't by design, of course), a malicious local user can add code that will be executed as root when root next runs grep-available. In your opinion, is there any potential for a security problem in this scheme? If there is, what should I do about it? -- Antti-Juhani