MESSAGE
DATE | 2007-02-18 |
FROM | Ruben Safir
|
SUBJECT | Re: [NYLXS - HANGOUT] [meissner@suse.de: [suse-security-announce] SUSE Security Announcement: samba remote denial of service (SUSE-SA:2007:016)]
|
On Sat, Feb 17, 2007 at 06:13:29PM -0500, David Sugar wrote: > It should be interesting to see how this may play out in the future with > Suse when Samba starts using GPLv3 or later... >
If SAMBA starts using the GPL3, how will that affect the package management tools needed to deliver the product? If you think this is bizzarre, read the even stranger thread in NYLUG about Apache and Package tools. Someone comes to NYLUG babbling about an Apache problem which he is only capable of describing in terms of the Package Manager. Its pointed out to him that his problem is with Apache and not APT-GET and that his question is making no sense, and then the then ad-hunimum attacks are laid out against me. When pointed out that Apache is designed from the ground up to be distributed and installed from its source tree using its compiler tools which also are designed to facilitate the professional use of custom module building, then I'm kicked off of NYLUGs mailing list.
So that is exactly what I had in mind with the package management statement. While I'm being wrongful accused of being anti-packages, here I am posting a security upgrade available through the official SuSE packaging system.
But the best part is that the poor bastard on the NYLUG list is still under the misconception that he has 'fixed' his problem, a problem he doesn't have a clue as to its nature. Obviously if an Apache upgrade isn't working smothly the problem must be he has the wrong packages....not that his config file, httpd binary and modules don't match up and that he doesn't have a damn clue as to why.
Ruben
> Ruben Safir wrote: > > > On Sat, Feb 17, 2007 at 08:59:00AM -0500, David Sugar wrote: > > > How is this a "package management" issue? > > > > > > Ruben Safir wrote: > > > > > > > Speaking of Package Maangmeent > > > > > > > > Off course it isn't but package management give you the ability in theory > > to upgrade smoothly within a distro. I think this theory is streched to far > > by many, especially within the debian community. > > > > > > > > > > The Samba daemon was affected by a security problem, where a > > > > logic error in the deferred open code can lead to an infinite loop > > > > (CVE-2007-0452). > > > > > > > > > > BTW - this bug is a good one. Not too often for infinite loops from logic > > escape the vetting process or a major product like SAMBA > > > > Ruben > > > > > > > > This problem could be used by remote authenticated attackers that > > > > have access to the samba daemon. > > > > > > > > Two other problems fixed in the upstream samba security release > > > > that do not affect the SUSE Samba version: > > > > > > > > - CVE-2007-0454: A format string problem in AFS ACL handling. > > > > None of our shipping Samba versions have this option compiled in. > > > > > > > > - CVE-2007-0453: A buffer overflow in nss_winbind on Solaris. > > > > Linux is generally not affected by this problem. > > > > > > > > 2) Solution or Work-Around > > > > > > > > There is no known workaround, please install the update packages. > > > > > > > > 3) Special Instructions and Notes > > > > > > > > None. > > > > > > > > 4) Package Location and Checksums > > > > > > > > The preferred method for installing security updates is to use the YaST > > > > Online Update (YOU) tool. YOU detects which updates are required and > > > > automatically performs the necessary steps to verify and install them. > > > > Alternatively, download the update packages for your distribution manually > > > > and verify their integrity by the methods listed in Section 6 of this > > > > announcement. Then install the packages using the command > > > > > > > > rpm -Fhv > > > > > > > > to apply the update, replacing with the filename of the > > > > downloaded RPM package. > > > > > > > > > > > > x86 Platform: > > > > > > > > openSUSE 10.2: > > > > ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/samba-3.0.23d-19.2.i586.rpm > > > > 6b4cb2859d1321648fd46c30a6cfd343 > > > > ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/samba-client-3.0.23d-19.2.i586.rpm > > > > b168ff8f07a792bf6fb66a91c893ae33 > > > > ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/samba-winbind-3.0.23d-19.2.i586.rpm > > > > 23e180e09af077fd64b35d8154d414c6 > > > > > > > > SUSE LINUX 10.1: > > > > ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/samba-3.0.22-13.27.i586.rpm > > > > 898c1eb0d0d4f1c806ce7fb8907753d7 > > > > ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/samba-client-3.0.22-13.27.i586.rpm > > > > d4f4efa7488aa12edd8f9ac2074fbbc3 > > > > ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/samba-winbind-3.0.22-13.27.i586.rpm > > > > f2d11fdea4fa460cfb5bda4e20fc5e86 > > > > > > > > SUSE LINUX 10.0: > > > > ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/samba-3.0.20b-3.8.i586.rpm > > > > ce7bcec67ee32a5415d4cb5907ec0372 > > > > > > > > SUSE LINUX 9.3: > > > > ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/samba-3.0.13-1.6.i586.rpm > > > > 7cc438d1cc0e8d4f479844bfccc8f698 > > > > > > > > Power PC Platform: > > > > > > > > openSUSE 10.2: > > > > ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/samba-3.0.23d-19.2.ppc.rpm > > > > d3b20aff8d493b48741b160c223bd268 > > > > ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/samba-client-3.0.23d-19.2.ppc.rpm > > > > 790670189510dce128dca2f3f32f2b9c > > > > ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/samba-winbind-3.0.23d-19.2.ppc.rpm > > > > 43815e4efd08eae9e26242be281ba2fe > > > > > > > > SUSE LINUX 10.1: > > > > ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/samba-3.0.22-13.27.ppc.rpm > > > > a2d2ce421081a74258c5328a5a432629 > > > > ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/samba-client-3.0.22-13.27.ppc.rpm > > > > f86d3c623aadc34f1f64f173108f9c4b > > > > ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/samba-winbind-3.0.22-13.27.ppc.rpm > > > > b95e5643763b4f172adec030fa9033be > > > > > > > > SUSE LINUX 10.0: > > > > ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/samba-3.0.20b-3.8.ppc.rpm > > > > 8badc1520efe79ac17b053be83648e46 > > > > > > > > x86-64 Platform: > > > > > > > > openSUSE 10.2: > > > > ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/samba-3.0.23d-19.2.x86_64.rpm > > > > a23ee65e112c499b91af6c00ab068efa > > > > ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/samba-32bit-3.0.23d-19.2.x86_64.rpm > > > > 09785d54c57f6da705acfa0f911b0b8d > > > > ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/samba-client-3.0.23d-19.2.x86_64.rpm > > > > c4b7be8c144842fd6947bfa7bf56891a > > > > ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/samba-client-32bit-3.0.23d-19.2.x86_64.rpm > > > > 5a474e36e2f20b086138fb1d7a225942 > > > > ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/samba-winbind-3.0.23d-19.2.x86_64.rpm > > > > c3ebad542ec53b71d3641310f796b430 > > > > ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/samba-winbind-32bit-3.0.23d-19.2.x86_64.rpm > > > > 1d0480ab089c3be84de54bc6bad71910 > > > > > > > > SUSE LINUX 10.1: > > > > ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/samba-3.0.22-13.27.x86_64.rpm > > > > be6125ae205f2274150a29a4c251e8c0 > > > > ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/samba-32bit-3.0.22-13.27.x86_64.rpm > > > > 6bd817cbdf52fd2e4ff8257442ba1d60 > > > > ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/samba-client-3.0.22-13.27.x86_64.rpm > > > > 5cd72ad1de6b29173a9e3d23a1012b2c > > > > ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/samba-client-32bit-3.0.22-13.27.x86_64.rpm > > > > a6509bd2aa7b9c7421e4d1777ce2bba3 > > > > ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/samba-winbind-3.0.22-13.27.x86_64.rpm > > > > 0d3cb4f0c3bcef1a5569dd5d72b3c73b > > > > ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/samba-winbind-32bit-3.0.22-13.27.x86_64.rpm > > > > e9dbf740b218735e385a348524d31108 > > > > > > > > SUSE LINUX 10.0: > > > > ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/samba-3.0.20b-3.8.x86_64.rpm > > > > f0ad5468ce42ff2631e9a6b3231010c1 > > > > > > > > SUSE LINUX 9.3: > > > > ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/samba-3.0.13-1.6.x86_64.rpm > > > > fbd0c2a208fd91da991e53b54fb1a57d > > > > > > > > Sources: > > > > > > > > openSUSE 10.2: > > > > ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/samba-3.0.23d-19.2.src.rpm > > > > 54d62f5dad95981f0ae894619d0f06ea > > > > > > > > SUSE LINUX 10.1: > > > > ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/samba-3.0.22-13.27.src.rpm > > > > 8b2e1c4b662fc43fa03fe1ba60342c00 > > > > > > > > SUSE LINUX 10.0: > > > > ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/samba-3.0.20b-3.8.src.rpm > > > > 9217074c11c43c30860be28b33f034dd > > > > > > > > SUSE LINUX 9.3: > > > > ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/samba-3.0.13-1.6.src.rpm > > > > 117006e9e50e888e4848aa320e88b18d > > > > > > > > Our maintenance customers are notified individually. The packages are > > > > offered for installation from the maintenance web: > > > > > > > > SUSE SLES 10 > > > > http://support.novell.com/techcenter/psdb/1324cf66bf45968bebbd721ece5f92c7.html > > > > > > > > SUSE SLED 10 > > > > http://support.novell.com/techcenter/psdb/1324cf66bf45968bebbd721ece5f92c7.html > > > > > > > > Open Enterprise Server > > > > http://support.novell.com/techcenter/psdb/75665d46b2b2dc409e252b880a1ad2f4.html > > > > > > > > Novell Linux POS 9 > > > > http://support.novell.com/techcenter/psdb/75665d46b2b2dc409e252b880a1ad2f4.html > > > > > > > > Novell Linux Desktop 9 > > > > http://support.novell.com/techcenter/psdb/75665d46b2b2dc409e252b880a1ad2f4.html > > > > > > > > SUSE SLES 9 > > > > http://support.novell.com/techcenter/psdb/75665d46b2b2dc409e252b880a1ad2f4.html > > > > > > > > ______________________________________________________________________________ > > > > > > > > 5) Pending Vulnerabilities, Solutions, and Work-Arounds: > > > > > > > > See SUSE Security Summary Report. > > > > ______________________________________________________________________________ > > > > > > > > 6) Authenticity Verification and Additional Information > > > > > > > > - Announcement authenticity verification: > > > > > > > > SUSE security announcements are published via mailing lists and on Web > > > > sites. The authenticity and integrity of a SUSE security announcement is > > > > guaranteed by a cryptographic signature in each announcement. All SUSE > > > > security announcements are published with a valid signature. > > > > > > > > To verify the signature of the announcement, save it as text into a file > > > > and run the command > > > > > > > > gpg --verify > > > > > > > > replacing with the name of the file where you saved the > > > > announcement. The output for a valid signature looks like: > > > > > > > > gpg: Signature made using RSA key ID 3D25D3D9 > > > > gpg: Good signature from "SuSE Security Team " > > > > > > > > where is replaced by the date the document was signed. > > > > > > > > If the security team's key is not contained in your key ring, you can > > > > import it from the first installation CD. To import the key, use the > > > > command > > > > > > > > gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc > > > > > > > > - Package authenticity verification: > > > > > > > > SUSE update packages are available on many mirror FTP servers all over the > > > > world. While this service is considered valuable and important to the free > > > > and open source software community, the authenticity and the integrity of > > > > a package needs to be verified to ensure that it has not been tampered > > > > with. > > > > > > > > There are two verification methods that can be used independently from > > > > each other to prove the authenticity of a downloaded file or RPM package: > > > > > > > > 1) Using the internal gpg signatures of the rpm package > > > > 2) MD5 checksums as provided in this announcement > > > > > > > > 1) The internal rpm package signatures provide an easy way to verify the > > > > authenticity of an RPM package. Use the command > > > > > > > > rpm -v --checksig > > > > > > > > to verify the signature of the package, replacing with the > > > > filename of the RPM package downloaded. The package is unmodified if it > > > > contains a valid signature from build-at-suse.de with the key ID 9C800ACA. > > > > > > > > This key is automatically imported into the RPM database (on > > > > RPMv4-based distributions) and the gpg key ring of 'root' during > > > > installation. You can also find it on the first installation CD and at > > > > the end of this announcement. > > > > > > > > 2) If you need an alternative means of verification, use the md5sum > > > > command to verify the authenticity of the packages. Execute the command > > > > > > > > md5sum > > > > > > > > after you downloaded the file from a SUSE FTP server or its mirrors. > > > > Then compare the resulting md5sum with the one that is listed in the > > > > SUSE security announcement. Because the announcement containing the > > > > checksums is cryptographically signed (by security-at-suse.de), the > > > > checksums show proof of the authenticity of the package if the > > > > signature of the announcement is valid. Note that the md5 sums > > > > published in the SUSE Security Announcements are valid for the > > > > respective packages only. Newer versions of these packages cannot be > > > > verified. > > > > > > > > - SUSE runs two security mailing lists to which any interested party may > > > > subscribe: > > > > > > > > opensuse-security-at-opensuse.org > > > > - General Linux and SUSE security discussion. > > > > All SUSE security announcements are sent to this list. > > > > To subscribe, send an e-mail to > > > > . > > > > > > > > suse-security-announce-at-suse.com > > > > - SUSE's announce-only mailing list. > > > > Only SUSE's security announcements are sent to this list. > > > > To subscribe, send an e-mail to > > > > . > > > > > > > > ===================================================================== > > > > SUSE's security contact is or . > > > > The public key is listed below. > > > > ===================================================================== > > > > ______________________________________________________________________________ > > > > > > > > The information in this advisory may be distributed or reproduced, > > > > provided that the advisory is not modified in any way. In particular, the > > > > clear text signature should show proof of the authenticity of the text. > > > > > > > > SUSE Linux Products GmbH provides no warranties of any kind whatsoever > > > > with respect to the information contained in this security advisory. > > > > > > > > Type Bits/KeyID Date User ID > > > > pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team > > > > pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key > > > > > > > > - -----BEGIN PGP PUBLIC KEY BLOCK----- > > > > Version: GnuPG v1.4.2 (GNU/Linux) > > > > > > > > mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA > > > > BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz > > > > JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh > > > > 1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U > > > > P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+ > > > > cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg > > > > VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b > > > > yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7 > > > > tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ > > > > xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63 > > > > Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo > > > > choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI > > > > BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u > > > > v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+ > > > > x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0 > > > > Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq > > > > MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2 > > > > saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o > > > > L0oixF12CohGBBARAgAGBQI7HmHDAAoJEJ5A4xAACqukTlQAoI4QzP9yjPohY7OU > > > > F7J3eKBTzp25AJ42BmtSd3pvm5ldmognWF3Trhp+GYkAlQMFEDe3O8IWkDf+zvyS > > > > FQEBAfkD/3GG5UgJj18UhYmh1gfjIlDcPAeqMwSytEHDENmHC+vlZQ/p0mT9tPiW > > > > tp34io54mwr+bLPN8l6B5GJNkbGvH6M+mO7R8Lj4nHL6pyAv3PQr83WyLHcaX7It > > > > Klj371/4yzKV6qpz43SGRK4MacLo2rNZ/dNej7lwPCtzCcFYwqkiiEYEEBECAAYF > > > > AjoaQqQACgkQx1KqMrDf94ArewCfWnTUDG5gNYkmHG4bYL8fQcizyA4An2eVo/n+ > > > > 3J2KRWSOhpAMsnMxtPbBmQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCk > > > > YS3yEKeueNWc+z/0Kvff4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP > > > > +Y0PFPboMvKx0FXl/A0dM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR > > > > 8xocQSVCFxcwvwCglVcOQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U > > > > 8c/yE/vdvpN6lF0tmFrKXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0S > > > > cZqITuZC4CWxJa9GynBED3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEh > > > > ELBeGaPdNCcmfZ66rKUdG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtB > > > > UVKn4zLUOf6aeBAoV6NMCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOo > > > > AqajLfvkURHAeSsxXIoEmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1n > > > > KFvF+rQoU3VTRSBQYWNrYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohi > > > > BBMRAgAiBQJA2AY+AhsDBQkObd+9BAsHAwIDFQIDAxYCAQIeAQIXgAAKCRCoTtro > > > > nIAKypCfAJ9RuZ6ZSV7QW4pTgTIxQ+ABPp0sIwCffG9bCNnrETPlgOn+dGEkAWeg > > > > KL+IRgQQEQIABgUCOnBeUgAKCRCeQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lx > > > > yoAejACeOO1HIbActAevk5MUBhNeLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWn > > > > B/9An5vfiUUE1VQnt+T/EYklES3tXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDV > > > > wM2OgSEISZxbzdXGnqIlcT08TzBUD9i579uifklLsnr35SJDZ6ram51/CWOnnaVh > > > > UzneOA9gTPSr+/fT3WeVnwJiQCQ30kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF > > > > 5Yryk23pQUPAgJENDEqeU6iIO9Ot1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3 > > > > D3EN8C1yPqZd5CvvznYvB6bWBIpWcRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGu > > > > zgpJt9IXSzyohEJB6XG5+D0BuQINBDnu9JIQCACEkdBN6Mxf5WvqDWkcMRy6wnrd > > > > 9DYJ8UUTmIT2iQf07tRUKJJ9v0JXfx2Z4d08IQSMNRaq4VgSe+PdYgIy0fbj23Vi > > > > a5/gO7fJEpD2hd2f+pMnOWvH2rOOIbeYfuhzAc6BQjAKtmgR0ERUTafTM9Wb6F13 > > > > CNZZNZfDqnFDP6L12w3z3F7FFXkz07Rs3AIto1ZfYZd4sCSpMr/0S5nLrHbIvGLp > > > > 271hhQBeRmmoGEKO2JRelGgUJ2CUzOdtwDIKT0LbCpvaP8PVnYF5IFoYJIWRHqlE > > > > t5ucTXstZy7vYjL6vTP4l5xs+LIOkNmPhqmfsgLzVo0UaLt80hOwc4NvDCOLAAMG > > > > B/9g+9V3ORzw4LvO1pwRYJqfDKUq/EJ0rNMMD4N8RLpZRhKHKJUm9nNHLbksnlZw > > > > rbSTM5LpC/U6sheLP+l0bLVoq0lmsCcUSyh+mY6PxWirLIWCn/IAZAGnXb6Zd6Tt > > > > IJlGG6pqUN8QxGJYQnonl0uTJKHJENbI9sWHQdcTtBMc34gorHFCo1Bcvpnc1LFL > > > > rWn7mfoGx6INQjf3HGQpMXAWuSBQhzkazY6vaWFpa8bBJ+gKbBuySWzNm3rFtT5H > > > > RKMWpO+M9bHp4d+puY0L1YwN1OMatcMMpcWnZpiWiR83oi32+xtWUY2U7Ae38mMa > > > > g8zFbpeqPQUsDv9V7CAJ1dbriEwEGBECAAwFAkDYBnoFCQ5t3+gACgkQqE7a6JyA > > > > CspnpgCfRbYwxT3iq+9l/PgNTUNTZOlof2oAn25y0eGi0371jap9kOV6uq71sUuO > > > > =ypVs > > > > - -----END PGP PUBLIC KEY BLOCK----- > > > > > > > > -----BEGIN PGP SIGNATURE----- > > > > Version: GnuPG v1.4.5 (GNU/Linux) > > > > > > > > iQEVAwUBRdR2Fney5gA9JdPZAQLeawf/Uo/2+4TN671UTrhta64JVfjQBnVVJHiN > > > > ENzfVaWsXa/bz5ap6gTBgBq5JXXnP1iWa45X9ExDAENa6f6X3Q5FYk8OCXELoA8p > > > > Gfxply/IhHNEDpeBtyaGD5spElVf6rPrqemxfmd8CZYS3pAlrVdItWuTI3c0JaNX > > > > n1o3JwEBg+sit43moI55kkShvUgkpg4ZYPXtBV+sENSS5bzB8i6ZHgSpI3Xn++Gx > > > > lH01aDeei31TBEgb8PQ6dAWLdXmxlqVS7a3MQqWBlbog/Kthi7/dNqbypPHY1UxV > > > > 2FXBpFigSkRIYXHty5kCEhSyVTL8YKiFwTrgtavS9fJxp/2iuTAdzg== > > > > =MPha > > > > -----END PGP SIGNATURE----- > > > > > > > > -- > > > > To unsubscribe, e-mail: suse-security-announce-unsubscribe-at-suse.com > > > > For additional commands, e-mail: suse-security-announce-help-at-suse.com > > > > > > > > ----- End forwarded message ----- > > > > > > > > -- > > > > http://www.mrbrklyn.com - Interesting Stuff > > > > http://www.nylxs.com - Leadership Development in Free Software > > > > > > > > So many immigrant groups have swept through our town that Brooklyn, like Atlantis, reaches mythological proportions in the mind of the world - RI Safir 1998 > > > > > > > > http://fairuse.nylxs.com DRM is THEFT - We are the STAKEHOLDERS - RI Safir 2002 > > > > > > > > "Yeah - I write Free Software...so SUE ME" > > > > > > > > "The tremendous problem we face is that we are becoming sharecroppers to our own cultural heritage -- we need the ability to participate in our own society." > > > > > > > > "> I'm an engineer. I choose the best tool for the job, politics be damned.< > > > > You must be a stupid engineer then, because politcs and technology have been attacted at the hip since the 1st dynasty in Ancient Egypt. I guess you missed that one." > > > > -- > > http://www.mrbrklyn.com - Interesting Stuff > > http://www.nylxs.com - Leadership Development in Free Software > > > > So many immigrant groups have swept through our town that Brooklyn, like Atlantis, reaches mythological proportions in the mind of the world - RI Safir 1998 > > > > http://fairuse.nylxs.com DRM is THEFT - We are the STAKEHOLDERS - RI Safir 2002 > > > > "Yeah - I write Free Software...so SUE ME" > > > > "The tremendous problem we face is that we are becoming sharecroppers to our own cultural heritage -- we need the ability to participate in our own society." > > > > "> I'm an engineer. I choose the best tool for the job, politics be damned.< > > You must be a stupid engineer then, because politcs and technology have been attacted at the hip since the 1st dynasty in Ancient Egypt. I guess you missed that one."
-- http://www.mrbrklyn.com - Interesting Stuff http://www.nylxs.com - Leadership Development in Free Software
So many immigrant groups have swept through our town that Brooklyn, like Atlantis, reaches mythological proportions in the mind of the world - RI Safir 1998
http://fairuse.nylxs.com DRM is THEFT - We are the STAKEHOLDERS - RI Safir 2002
"Yeah - I write Free Software...so SUE ME"
"The tremendous problem we face is that we are becoming sharecroppers to our own cultural heritage -- we need the ability to participate in our own society."
"> I'm an engineer. I choose the best tool for the job, politics be damned.< You must be a stupid engineer then, because politcs and technology have been attacted at the hip since the 1st dynasty in Ancient Egypt. I guess you missed that one."
|
|