lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu) Subject: Re: [RHSA-2003:279-01] Updated OpenSSH packages fix potential vulnerability On Wed, 17 Sep 2003 07:31:24 EDT, "Brown, Rodrick" said: > I tend to agree with the author the vendor spamming is getting ridiclous 90% > of there users dont even read securitylists, and its very redundant and silly > to have 6 to 10 vendors spam mailinglists with patches to a exploited > application we have been discussing for months. Procmail is your friend.. :0 *List-Id:.*full-disclosure *From:.*security@(redhat|suse|sgi|microsoft|hp|debian).(com|org) /dev/null Add salt, pepper, and other seasonings to taste. (No, it won't work as-is) Also, it really helps if your MUA is smart enough to do duplicate suppression based on Message-ID:. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 226 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030917/efdebc14/attachment.bin
Powered by blists - more mailing lists