Fri Aug 19 22:24:00 2022
EVENTS
 FREE
SOFTWARE
INSTITUTE

POLITICS
JOBS
MEMBERS'
CORNER

MAILING
LIST

NYLXS Mailing Lists and Archives
NYLXS Members have a lot to say and share but we don't keep many secrets. Join the Hangout Mailing List and say your peice.

DATE 2005-12-01

HANGOUT

2022-08-19 | 2022-07-19 | 2022-06-19 | 2022-05-19 | 2022-04-19 | 2022-03-19 | 2022-02-19 | 2022-01-19 | 2021-12-19 | 2021-11-19 | 2021-10-19 | 2021-09-19 | 2021-08-19 | 2021-07-19 | 2021-06-19 | 2021-05-19 | 2021-04-19 | 2021-03-19 | 2021-02-19 | 2021-01-19 | 2020-12-19 | 2020-11-19 | 2020-10-19 | 2020-09-19 | 2020-08-19 | 2020-07-19 | 2020-06-19 | 2020-05-19 | 2020-04-19 | 2020-03-19 | 2020-02-19 | 2020-01-19 | 2019-12-19 | 2019-11-19 | 2019-10-19 | 2019-09-19 | 2019-08-19 | 2019-07-19 | 2019-06-19 | 2019-05-19 | 2019-04-19 | 2019-03-19 | 2019-02-19 | 2019-01-19 | 2018-12-19 | 2018-11-19 | 2018-10-19 | 2018-09-19 | 2018-08-19 | 2018-07-19 | 2018-06-19 | 2018-05-19 | 2018-04-19 | 2018-03-19 | 2018-02-19 | 2018-01-19 | 2017-12-19 | 2017-11-19 | 2017-10-19 | 2017-09-19 | 2017-08-19 | 2017-07-19 | 2017-06-19 | 2017-05-19 | 2017-04-19 | 2017-03-19 | 2017-02-19 | 2017-01-19 | 2016-12-19 | 2016-11-19 | 2016-10-19 | 2016-09-19 | 2016-08-19 | 2016-07-19 | 2016-06-19 | 2016-05-19 | 2016-04-19 | 2016-03-19 | 2016-02-19 | 2016-01-19 | 2015-12-19 | 2015-11-19 | 2015-10-19 | 2015-09-19 | 2015-08-19 | 2015-07-19 | 2015-06-19 | 2015-05-19 | 2015-04-19 | 2015-03-19 | 2015-02-19 | 2015-01-19 | 2014-12-19 | 2014-11-19 | 2014-10-19 | 2014-09-19 | 2014-08-19 | 2014-07-19 | 2014-06-19 | 2014-05-19 | 2014-04-19 | 2014-03-19 | 2014-02-19 | 2014-01-19 | 2013-12-19 | 2013-11-19 | 2013-10-19 | 2013-09-19 | 2013-08-19 | 2013-07-19 | 2013-06-19 | 2013-05-19 | 2013-04-19 | 2013-03-19 | 2013-02-19 | 2013-01-19 | 2012-12-19 | 2012-11-19 | 2012-10-19 | 2012-09-19 | 2012-08-19 | 2012-07-19 | 2012-06-19 | 2012-05-19 | 2012-04-19 | 2012-03-19 | 2012-02-19 | 2012-01-19 | 2011-12-19 | 2011-11-19 | 2011-10-19 | 2011-09-19 | 2011-08-19 | 2011-07-19 | 2011-06-19 | 2011-05-19 | 2011-04-19 | 2011-03-19 | 2011-02-19 | 2011-01-19 | 2010-12-19 | 2010-11-19 | 2010-10-19 | 2010-09-19 | 2010-08-19 | 2010-07-19 | 2010-06-19 | 2010-05-19 | 2010-04-19 | 2010-03-19 | 2010-02-19 | 2010-01-19 | 2009-12-19 | 2009-11-19 | 2009-10-19 | 2009-09-19 | 2009-08-19 | 2009-07-19 | 2009-06-19 | 2009-05-19 | 2009-04-19 | 2009-03-19 | 2009-02-19 | 2009-01-19 | 2008-12-19 | 2008-11-19 | 2008-10-19 | 2008-09-19 | 2008-08-19 | 2008-07-19 | 2008-06-19 | 2008-05-19 | 2008-04-19 | 2008-03-19 | 2008-02-19 | 2008-01-19 | 2007-12-19 | 2007-11-19 | 2007-10-19 | 2007-09-19 | 2007-08-19 | 2007-07-19 | 2007-06-19 | 2007-05-19 | 2007-04-19 | 2007-03-19 | 2007-02-19 | 2007-01-19 | 2006-12-19 | 2006-11-19 | 2006-10-19 | 2006-09-19 | 2006-08-19 | 2006-07-19 | 2006-06-19 | 2006-05-19 | 2006-04-19 | 2006-03-19 | 2006-02-19 | 2006-01-19 | 2005-12-19 | 2005-11-19 | 2005-10-19 | 2005-09-19 | 2005-08-19 | 2005-07-19 | 2005-06-19 | 2005-05-19 | 2005-04-19 | 2005-03-19 | 2005-02-19 | 2005-01-19 | 2004-12-19 | 2004-11-19 | 2004-10-19 | 2004-09-19 | 2004-08-19 | 2004-07-19 | 2004-06-19 | 2004-05-19 | 2004-04-19 | 2004-03-19 | 2004-02-19 | 2004-01-19 | 2003-12-19 | 2003-11-19 | 2003-10-19 | 2003-09-19 | 2003-08-19 | 2003-07-19 | 2003-06-19 | 2003-05-19 | 2003-04-19 | 2003-03-19 | 2003-02-19 | 2003-01-19 | 2002-12-19 | 2002-11-19 | 2002-10-19 | 2002-09-19 | 2002-08-19 | 2002-07-19 | 2002-06-19 | 2002-05-19 | 2002-04-19 | 2002-03-19 | 2002-02-19 | 2002-01-19 | 2001-12-19 | 2001-11-19 | 2001-10-19 | 2001-09-19 | 2001-08-19 | 2001-07-19 | 2001-06-19 | 2001-05-19 | 2001-04-19 | 2001-03-19 | 2001-02-19 | 2001-01-19 | 2000-12-19 | 2000-11-19 | 2000-10-19 | 2000-09-19 | 2000-08-19 | 2000-07-19 | 2000-06-19 | 2000-05-19 | 2000-04-19 | 2000-03-19 | 2000-02-19 | 2000-01-19 | 1999-12-19

Key: Value:

Key: Value:

MESSAGE
DATE 2005-12-06
FROM Ruben Safir
SUBJECT Subject: [NYLXS - HANGOUT] [Fwd: [suse-security-announce] SUSE Security Announcement: kernel
From owner-hangout-at-mrbrklyn.com Tue Dec 6 07:10:07 2005
Received: from www2.mrbrklyn.com (localhost [127.0.0.1])
by www2.mrbrklyn.com (8.13.1/8.13.1/SuSE Linux 0.7) with ESMTP id jB6CA5Op003497
for ; Tue, 6 Dec 2005 07:10:07 -0500
Received: (from majordomo-at-localhost)
by www2.mrbrklyn.com (8.13.1/8.13.1/Submit) id jB6CA595003496
for hangout-outgoings; Tue, 6 Dec 2005 07:10:05 -0500
X-Authentication-Warning: www2.mrbrklyn.com: majordomo set sender to owner-hangout-at-nylxs.com using -f
Received: from stat29.mrbrklyn.com (stat29.mrbrklyn.com [10.0.0.35])
by www2.mrbrklyn.com (8.13.1/8.13.1/SuSE Linux 0.7) with ESMTP id jB6CA3IF003493
for ; Tue, 6 Dec 2005 07:10:05 -0500
Subject: [NYLXS - HANGOUT] [Fwd: [suse-security-announce] SUSE Security Announcement: kernel
various security and bugfixes (SUSE-SA:2005:067)]
From: Ruben Safir
Reply-To: ruben-at-mrbrklyn.com
To: hangout-at-mrbrklyn.com
Content-Type: text/plain
Organization: Brooklyn Linux Solutions
Message-Id: <1133871295.25966.54.camel-at-stat29.mrbrklyn.com>
Mime-Version: 1.0
X-Mailer: Ximian Evolution 1.4.4
Date: Tue, 06 Dec 2005 07:14:56 -0500
Content-Transfer-Encoding: 7bit
Sender: owner-hangout-at-mrbrklyn.com
Precedence: bulk
Content-Length: 28738
Lines: 583
Status: RO
X-Status:
X-Keywords:
X-UID: 22107

-----Forwarded Message-----
> From: Marcus Meissner
> To: suse-security-announce-at-suse.com
> Subject: [suse-security-announce] SUSE Security Announcement: kernel various security and bugfixes (SUSE-SA:2005:067)
> Date: Tue, 06 Dec 2005 12:35:33 +0100
>
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> ______________________________________________________________________________
>
> SUSE Security Announcement
>
> Package: kernel
> Announcement ID: SUSE-SA:2005:067
> Date: Tue, 06 Dec 2005 13:00:00 +0000
> Affected Products: SUSE LINUX 10.0
> Vulnerability Type: denial of service
> Severity (1-10): 6
> SUSE Default Package: yes
> Cross-References: CVE-2005-2973, CVE-2005-3044, CVE-2005-3055
> CVE-2005-3180, CVE-2005-3181, CVE-2005-3271
> CVE-2005-3527, CVE-2005-3783, CVE-2005-3784
> CVE-2005-3805, CVE-2005-3806, CVE-2005-3807
>
> Content of This Advisory:
> 1) Security Vulnerability Resolved:
> Various security fixes, bugfixes and a XEN update
> Problem Description
> 2) Solution or Work-Around
> 3) Special Instructions and Notes
> 4) Package Location and Checksums
> 5) Pending Vulnerabilities, Solutions, and Work-Arounds:
> See SUSE Security Summary Report.
> 6) Authenticity Verification and Additional Information
>
> ______________________________________________________________________________
>
> 1) Problem Description and Brief Discussion
>
> This kernel update for SUSE Linux 10.0 contains fixes for XEN, various
> security fixes and bug fixes.
>
> CVE-200n-nnnn numbers refer to Mitre CVE IDs (http://cve.mitre.org/).
>
> This update includes a more recent snapshot of the upcoming XEN 3.0.
> Many bugs have been fixed. Stability for x86_64 has been improved.
> Stability has been improved for SMP, and now both i586 and x86_64
> kernels are built with SMP support.
>
> This update contains the following security fixes:
>
> - CVE-2005-3783: A check in ptrace(2) handling that finds out if
> a process is attaching to itself was incorrect and could be used
> by a local attacker to crash the machine.
>
> - CVE-2005-3784: A check in reaping of terminating child processes did
> not consider ptrace(2) attached processes and would leave a ptrace
> reference dangling. This could lead to a local user being able to
> crash the machine.
>
> - CVE-2005-3271: A task leak problem when releasing POSIX timers was
> fixed. This could lead to local users causing a local denial of
> service by exhausting system memory.
>
> - CVE-2005-3805: A locking problem in POSIX timer handling could
> be used by a local attacker on a SMP system to deadlock the machine.
>
> - CVE-2005-3181: A problem in the Linux auditing code could lead
> to a memory leak which finally could exhaust system memory of
> a machine.
>
> - CVE-2005-2973: An infinite loop in the IPv6 UDP loopback handling
> can be easily triggered by a local user and lead to a denial
> of service.
>
> - CVE-2005-3806: A bug in IPv6 flow label handling code could be used
> by a local attacker to free non-allocated memory and in turn corrupt
> kernel memory and likely crash the machine.
>
> - CVE-2005-3807: A memory kernel leak in VFS lease handling can
> exhaust the machine memory and so cause a local denial of
> service. This is seen in regular Samba use and could also be
> triggered by local attackers.
>
> - CVE-2005-3055: Unplugging an user space controlled USB device with
> an URB pending in user space could crash the kernel. This can be
> easily triggered by local attacker.
>
> - CVE-2005-3180: Fixed incorrect padding in Orinoco wireless driver,
> which could expose kernel data to the air.
>
> - CVE-2005-3044: Missing sockfd_put() calls in routing_ioctl() leaked
> file handles which in turn could exhaust system memory.
>
> - CVE-2005-3527: A race condition in do_coredump in signal.c allows
> local users to cause a denial of service (machine hang) by triggering
> a core dump in one thread while another thread has a pending SIGSTOP.
>
> Additionally the following non security bugs were fixed:
> - Fix NFS cache consistency races which could lead to data corruption and
> crashes.
> - A kernel panic when loading the r8169 module without powermanagment
> was fixed.
> - i386: A race condition in the power management module powernow-k8
> was fixed.
> - Special ELF binaries without DATA and BSS segments could not be loaded
> due to too strict kernel checks.
> - Various bugs in the ALSA sound system were fixed.
> - A problem in IPv6 initialization with IPv6 disabled by policy that could
> leave dangling kernel pointers around was fixed.
> - Added sis 965l support to the sis5513 ide driver.
> - Disabled C2/C3 power management states on all IBM R40e BIOSes.
> - Fixed machine crash when switching the io-scheduler away from CFQ.
> - Call reboot notifiers of power off to switch off certain machines.
> - AMD64: Don't use TSC for time keeping on AMD single socket dual core
> systems.
> - Fixed the "treason uncloaked" kernel messages that were caused by
> a stale pred_flags variable when the TCP snd_wnd changes.
> - USB floppy drive SAMSUNG SFD-321U/EP was detected 8 times.
> - CONFIG_ACPI_HOTKEY is not supportable yet according to Intel, so we
> disabled it.
> - Disable ACPI on machines from before 2001 on all kernels again.
> - USB: always export interface information for modalias.
> - Various iSCSI fixes.
> - Avoid a potential fs corruption on SMP systems.
> - i386: Increased number of CONFIG_SERIAL_8250_NR_UARTS to 8.
> - Fixed a data corruption in the MD device driver when the delayed
> recovery is interrupted.
> - ahci: Don't set SActive for non-NCQ commands. This could have left
> the LED burning even for inactivity.
> - ppc: Handle GCC 4 generated relocations for 32bit memory access
> in the module loader.
> - ppc: Removed a special case for ppc to use MAC from prom if CSR is
> corrupt
> - CIFS: Made cifsd (kernel daemon for the CIFS filesystem) suspend
> aware.
> - Fixed ACPI issues on an ASUS L5D.
> - IDE: Worked around power management problems.
> - Disable AMD TLB flush filter on i386/x86-64 (might help 3d drivers)
> - Quiet down capacity reading from IDE CD when no media inserted.
> - ACPI: Worked around undefined ZOO* objects on certain Acer Aspire
> notebooks.
> - ACPI: Fixed Oops on pcc_acpi unloading.
> - ACPI: Fix hang in ACPI device scan on certain HP nx Laptops.
> - Fixed a bug in ACL handling of tmpfs.
> - Fix time going twice as fast problem on ATI Xpress chip sets.
>
> 2) Solution or Work-Around
>
> None, please install the fixed packages.
>
> 3) Special Instructions and Notes
>
> SPECIAL INSTALLATION INSTRUCTIONS
> =================================
> The following paragraphs guide you through the installation
> process in a step-by-step fashion. The character sequence "****"
> marks the beginning of a new paragraph. In some cases, the steps
> outlined in a particular paragraph may or may not be applicable
> to your situation. Therefore, make sure that you read through
> all of the steps below before attempting any of these
> procedures. All of the commands that need to be executed must be
> run as the superuser 'root'. Each step relies on the steps
> before it to complete successfully.
>
>
> **** Step 1: Determine the needed kernel type.
>
> Use the following command to determine which kind of kernel is
> installed on your system:
>
> rpm -qf --qf '%{name}\n' /boot/vmlinuz
>
>
> **** Step 2: Download the packages for your system.
>
> Download the kernel RPM package for your distribution with the
> name indicated by Step 1. Starting from SUSE LINUX 9.2, kernel
> modules that are not free were moved to a separate package with
> the suffix '-nongpl' in its name. Download that package as well
> if you rely on hardware that requires non-free drivers, such as
> some ISDN adapters. The list of all kernel RPM packages is
> appended below.
>
> The kernel-source package does not contain a binary kernel in
> bootable form. Instead, it contains the sources that correspond
> with the binary kernel RPM packages. This package is required to
> build third party add-on modules.
>
>
> **** Step 3: Verify authenticity of the packages.
>
> Verify the authenticity of the kernel RPM package using the
> methods as listed in Section 6 of this SUSE Security
> Announcement.
>
>
> **** Step 4: Installing your kernel rpm package.
>
> Install the rpm package that you have downloaded in Step 2 with
> the command
>
> rpm -Uhv
>
> replacing with the filename of the RPM package
> downloaded.
>
> Warning: After performing this step, your system may not boot
> unless the following steps have been followed
> completely.
>
>
> **** Step 5: Configuring and creating the initrd.
>
> The initrd is a RAM disk that is loaded into the memory of your
> system together with the kernel boot image by the boot loader.
> The kernel uses the content of this RAM disk to execute commands
> that must be run before the kernel can mount its root file
> system. The initrd is typically used to load hard disk
> controller drivers and file system modules. The variable
> INITRD_MODULES in /etc/sysconfig/kernel determines which kernel
> modules are loaded in the initrd.
>
> After a new kernel rpm has been installed, the initrd must be
> recreated to include the updated kernel modules. Usually this
> happens automatically when installing the kernel rpm. If
> creating the initrd fails for some reason, manually run the
> command
>
> /sbin/mkinitrd
>
>
> **** Step 6: Update the boot loader, if necessary.
>
> Depending on your software configuration, you either have the
> LILO or GRUB boot loader installed and initialized on your
> system. Use the command
>
> grep LOADER_TYPE /etc/sysconfig/bootloader
>
> to find out which boot loader is configured.
>
> The GRUB boot loader does not require any further action after a
> new kernel has been installed. You may proceed to the next step
> if you are using GRUB.
>
> If you use the LILO boot loader, lilo must be run to
> reinitialize the boot sector of the hard disk. Usually this
> happens automatically when installing the kernel RPM. In case
> this step fails, run the command
>
> /sbin/lilo
>
>
> Warning: An improperly installed boot loader will render your
> system unbootable.
>
>
> **** Step 7: Reboot.
>
> If all of the steps above have been successfully completed on
> your system, the new kernel including the kernel modules and the
> initrd are ready to boot. The system needs to be rebooted for
> the changes to be active. Make sure that all steps have been
> completed then reboot using the command
>
> /sbin/shutdown -r now
>
> Your system will now shut down and restart with the new kernel.
>
> 4) Package Location and Checksums
>
> The preferred method for installing security updates is to use the YaST
> Online Update (YOU) tool. YOU detects which updates are required and
> automatically performs the necessary steps to verify and install them.
> Alternatively, download the update packages for your distribution manually
> and verify their integrity by the methods listed in Section 6 of this
> announcement. Then install the packages using the command
>
> rpm -Fhv
>
> to apply the update, replacing with the filename of the
> downloaded RPM package.
>
>
> x86 Platform:
>
> SUSE LINUX 10.0:
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/Intel-536ep-4.69-14.2.i586.rpm
> 02d032c2a4e43516e382faa1c38593ff
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-2.6.13-15.7.i586.rpm
> 16ebf82f7f0eb76a7e95239a7748bd49
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-nongpl-2.6.13-15.7.i586.rpm
> 5efbba52b5b452ee68770c234d1c4206
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-2.6.13-15.7.i586.rpm
> 201dd3f4f090b01034c2706860a2ded1
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-nongpl-2.6.13-15.7.i586.rpm
> 890a9500a671e62c872a316094c976fc
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-2.6.13-15.7.i586.rpm
> 3824bd72e5e38f170a1f53cdf12b7936
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-nongpl-2.6.13-15.7.i586.rpm
> f1d4ca38c6f19b92a3ec2bdc4ee55ab7
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-source-2.6.13-15.7.i586.rpm
> 444382d73c4ea88144b58155032f3979
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-syms-2.6.13-15.7.i586.rpm
> 88ddaf01d3cdfc2a02f40c246f27a03f
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-2.6.13-15.7.i586.rpm
> 4a4282db387b1a50b7f0d8358811955c
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-nongpl-2.6.13-15.7.i586.rpm
> fd64850adff5fc8fab2a807afc07bac0
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-2.6.13-15.7.i586.rpm
> ec1ccdf16b4c2eadd789871e5bda3361
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-nongpl-2.6.13-15.7.i586.rpm
> ad5b17a6998f04832d29f189a5f42240
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/um-host-kernel-2.6.13-15.7.i586.rpm
> 1ed3738e413c0df9a131989560effb85
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xen-3.0_7608-2.1.i586.rpm
> dafe91eab2d6fbe749693373a561609d
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xen-devel-3.0_7608-2.1.i586.rpm
> 8a20190de6fef952115623503b2149f9
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xen-doc-html-3.0_7608-2.1.i586.rpm
> 1c27687f9f9482c72fdf300c64d0db4f
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xen-doc-pdf-3.0_7608-2.1.i586.rpm
> 356c1d14e0873344b8789e6bf36b94e2
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xen-doc-ps-3.0_7608-2.1.i586.rpm
> 7b9066e6834db4b1eb5505d089830714
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xen-tools-3.0_7608-2.1.i586.rpm
> 43b7333eea6e0e52ce2cb9431a9d3627
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xen-tools-ioemu-3.0_7608-2.1.i586.rpm
> f8d51a8b0119ea984317cad976ca16d5
>
> Power PC Platform:
>
> SUSE LINUX 10.0:
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-default-2.6.13-15.7.ppc.rpm
> b5b4e1ad4db39e8bede52cd0f171c508
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-iseries64-2.6.13-15.7.ppc.rpm
> a7fbffd1f09d4e6c9a58950fe1692361
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-ppc64-2.6.13-15.7.ppc.rpm
> a09e0b94d50c24ea8065b709ccb53775
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-source-2.6.13-15.7.ppc.rpm
> ae4c7ad291aaa37dceb43e331651b2c4
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-syms-2.6.13-15.7.ppc.rpm
> 51ddc5ea24587d210edb3e249b0472c9
>
> x86-64 Platform:
>
> SUSE LINUX 10.0:
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-2.6.13-15.7.x86_64.rpm
> ae11f5ccb7e1f96d9cb38444d1ae770f
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-nongpl-2.6.13-15.7.x86_64.rpm
> a2f3716cc423c87b8f7505629c13716a
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-2.6.13-15.7.x86_64.rpm
> 0899d5b37db71c18ac4d7733189388bd
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-nongpl-2.6.13-15.7.x86_64.rpm
> 108a43a7e5386d1f2b098e31f9299ec1
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-source-2.6.13-15.7.x86_64.rpm
> 94f28fdcbeff5b02c95da380808a0347
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-syms-2.6.13-15.7.x86_64.rpm
> 2d106be84319cdf38210076c4113a95a
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-2.6.13-15.7.x86_64.rpm
> 58f4740f9538a21e9e187c751a58a376
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-nongpl-2.6.13-15.7.x86_64.rpm
> 3c8a4dd3378a988c79675f9a84a2969c
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/xen-3.0_7608-2.1.x86_64.rpm
> 7595b44074a3d8cc51288e9473c81e0d
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/xen-devel-3.0_7608-2.1.x86_64.rpm
> 135cc2d6855f10518bbf6555405dd63d
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/xen-doc-html-3.0_7608-2.1.x86_64.rpm
> 481e6f688096bb367c35a67fb2185504
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/xen-doc-pdf-3.0_7608-2.1.x86_64.rpm
> 7f67dd3c63742fb07f424ff7cd1f87b3
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/xen-doc-ps-3.0_7608-2.1.x86_64.rpm
> e768c5066b488a556496574bccbda414
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/xen-tools-3.0_7608-2.1.x86_64.rpm
> 118c0e872deb66309fc9c6957969bad4
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/xen-tools-ioemu-3.0_7608-2.1.x86_64.rpm
> 00ecbc085cb200937224d8a2bbda3ec7
>
> Sources:
>
> SUSE LINUX 10.0:
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/Intel-536ep-4.69-14.2.src.rpm
> c4ee0c5893efbde6ecf45f0da05e5103
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.7.src.rpm
> 56dd71a804ebcaa1eb8268665dfa2b18
> ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/xen-3.0_7608-2.1.src.rpm
> 3571ce3e27ca472bffc2f2794eeae8a0
>
> ______________________________________________________________________________
>
> 5) Pending Vulnerabilities, Solutions, and Work-Arounds:
>
> See SUSE Security Summary Report.
> ______________________________________________________________________________
>
> 6) Authenticity Verification and Additional Information
>
> - Announcement authenticity verification:
>
> SUSE security announcements are published via mailing lists and on Web
> sites. The authenticity and integrity of a SUSE security announcement is
> guaranteed by a cryptographic signature in each announcement. All SUSE
> security announcements are published with a valid signature.
>
> To verify the signature of the announcement, save it as text into a file
> and run the command
>
> gpg --verify
>
> replacing with the name of the file where you saved the
> announcement. The output for a valid signature looks like:
>
> gpg: Signature made using RSA key ID 3D25D3D9
> gpg: Good signature from "SuSE Security Team "
>
> where is replaced by the date the document was signed.
>
> If the security team's key is not contained in your key ring, you can
> import it from the first installation CD. To import the key, use the
> command
>
> gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
>
> - Package authenticity verification:
>
> SUSE update packages are available on many mirror FTP servers all over the
> world. While this service is considered valuable and important to the free
> and open source software community, the authenticity and the integrity of
> a package needs to be verified to ensure that it has not been tampered
> with.
>
> There are two verification methods that can be used independently from
> each other to prove the authenticity of a downloaded file or RPM package:
>
> 1) Using the internal gpg signatures of the rpm package
> 2) MD5 checksums as provided in this announcement
>
> 1) The internal rpm package signatures provide an easy way to verify the
> authenticity of an RPM package. Use the command
>
> rpm -v --checksig
>
> to verify the signature of the package, replacing with the
> filename of the RPM package downloaded. The package is unmodified if it
> contains a valid signature from build-at-suse.de with the key ID 9C800ACA.
>
> This key is automatically imported into the RPM database (on
> RPMv4-based distributions) and the gpg key ring of 'root' during
> installation. You can also find it on the first installation CD and at
> the end of this announcement.
>
> 2) If you need an alternative means of verification, use the md5sum
> command to verify the authenticity of the packages. Execute the command
>
> md5sum
>
> after you downloaded the file from a SUSE FTP server or its mirrors.
> Then compare the resulting md5sum with the one that is listed in the
> SUSE security announcement. Because the announcement containing the
> checksums is cryptographically signed (by security-at-suse.de), the
> checksums show proof of the authenticity of the package if the
> signature of the announcement is valid. Note that the md5 sums
> published in the SUSE Security Announcements are valid for the
> respective packages only. Newer versions of these packages cannot be
> verified.
>
> - SUSE runs two security mailing lists to which any interested party may
> subscribe:
>
> suse-security-at-suse.com
> - General Linux and SUSE security discussion.
> All SUSE security announcements are sent to this list.
> To subscribe, send an e-mail to
> .
>
> suse-security-announce-at-suse.com
> - SUSE's announce-only mailing list.
> Only SUSE's security announcements are sent to this list.
> To subscribe, send an e-mail to
> .
>
> For general information or the frequently asked questions (FAQ),
> send mail to or
> .
>
> =====================================================================
> SUSE's security contact is or .
> The public key is listed below.
> =====================================================================
> ______________________________________________________________________________
>
> The information in this advisory may be distributed or reproduced,
> provided that the advisory is not modified in any way. In particular, the
> clear text signature should show proof of the authenticity of the text.
>
> SUSE Linux Products GmbH provides no warranties of any kind whatsoever
> with respect to the information contained in this security advisory.
>
> Type Bits/KeyID Date User ID
> pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team
> pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key
>
> - -----BEGIN PGP PUBLIC KEY BLOCK-----
> Version: GnuPG v1.0.6 (GNU/Linux)
> Comment: For info see http://www.gnupg.org
>
> mQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCkYS3yEKeueNWc+z/0Kvff
> 4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP+Y0PFPboMvKx0FXl/A0d
> M+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR8xocQSVCFxcwvwCglVcO
> QliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U8c/yE/vdvpN6lF0tmFrK
> XBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0ScZqITuZC4CWxJa9GynBE
> D3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEhELBeGaPdNCcmfZ66rKUd
> G5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtBUVKn4zLUOf6aeBAoV6NM
> CC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOoAqajLfvkURHAeSsxXIoE
> myW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1nKFvF+rQoU3VTRSBQYWNr
> YWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohcBBMRAgAcBQI57vSBBQkD
> wmcABAsKAwQDFQMCAxYCAQIXgAAKCRCoTtronIAKyl8sAJ98BgD40zw0GHJHIf6d
> NfnwI2PAsgCgjH1+PnYEl7TFjtZsqhezX7vZvYCIRgQQEQIABgUCOnBeUgAKCRCe
> QOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lxyoAejACeOO1HIbActAevk5MUBhNe
> LZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWnB/9An5vfiUUE1VQnt+T/EYklES3t
> XXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDVwM2OgSEISZxbzdXGnqIlcT08TzBU
> D9i579uifklLsnr35SJDZ6ram51/CWOnnaVhUzneOA9gTPSr+/fT3WeVnwJiQCQ3
> 0kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF5Yryk23pQUPAgJENDEqeU6iIO9Ot
> 1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3D3EN8C1yPqZd5CvvznYvB6bWBIpW
> cRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGuzgpJt9IXSzyohEJB6XG5+D0BiF0E
> ExECAB0FAjxqqTQFCQoAgrMFCwcKAwQDFQMCAxYCAQIXgAAKCRCoTtronIAKyp1f
> AJ9dR7saz2KPNwD3U+fy/0BDKXrYGACfbJ8fQcJqCBQxeHvt9yMPDVq0B0W5Ag0E
> Oe70khAIAISR0E3ozF/la+oNaRwxHLrCet30NgnxRROYhPaJB/Tu1FQokn2/Qld/
> HZnh3TwhBIw1FqrhWBJ7491iAjLR9uPbdWJrn+A7t8kSkPaF3Z/6kyc5a8fas44h
> t5h+6HMBzoFCMAq2aBHQRFRNp9Mz1ZvoXXcI1lk1l8OqcUM/ovXbDfPcXsUVeTPT
> tGzcAi2jVl9hl3iwJKkyv/RLmcusdsi8YunbvWGFAF5GaagYQo7YlF6UaBQnYJTM
> 523AMgpPQtsKm9o/w9WdgXkgWhgkhZEeqUS3m5xNey1nLu9iMvq9M/iXnGz4sg6Q
> 2Y+GqZ+yAvNWjRRou3zSE7Bzg28MI4sAAwYH/2D71Xc5HPDgu87WnBFgmp8MpSr8
> QnSs0wwPg3xEullGEocolSb2c0ctuSyeVnCttJMzkukL9TqyF4s/6XRstWirSWaw
> JxRLKH6Zjo/FaKsshYKf8gBkAaddvpl3pO0gmUYbqmpQ3xDEYlhCeieXS5MkockQ
> 1sj2xYdB1xO0ExzfiCiscUKjUFy+mdzUsUutafuZ+gbHog1CN/ccZCkxcBa5IFCH
> ORrNjq9pYWlrxsEn6ApsG7JJbM2besW1PkdEoxak74z1senh36m5jQvVjA3U4xq1
> wwylxadmmJaJHzeiLfb7G1ZRjZTsB7fyYxqDzMVul6o9BSwO/1XsIAnV1uuITAQY
> EQIADAUCOe70kgUJA8JnAAAKCRCoTtronIAKyksiAJsFB3/77SkH3JlYOGrEe1Ol
> 0JdGwACeKTttgeVPFB+iGJdiwQlxasOfuXyITAQYEQIADAUCPGqpWQUJCgCCxwAK
> CRCoTtronIAKyofBAKCSZM2UFyta/fe9WgITK9I5hbxxtQCfX+0ar2CZmSknn3co
> SPihn1+OBNyZAQ0DNuEtBAAAAQgAoCRcd7SVZEFcumffyEwfLTcXQjhKzOahzxpo
> omuF+HIyU4AGq+SU8sTZ/1SsjhdzzrSAfv1lETACA+3SmLr5KV40Us1w0UC64cwt
> A46xowVq1vMlH2Lib+V/qr3b1hE67nMHjysECVx9Ob4gFuKNoR2eqnAaJvjnAT8J
> /LoUC20EdCHUqn6v+M9t/WZgC+WNR8cq69uDy3YQhDP/nIan6fm2uf2kSV9A7ZxE
> GrwsWl/WX5Q/sQqMWaU6r4az98X3z90/cN+eJJ3vwtA+rm+nxEvyev+jaLuOQBDf
> ebh/XA4FZ35xmi+spdiVeJH4F/ubaGlmj7+wDOF3suYAPSXT2QAFEbQlU3VTRSBT
> ZWN1cml0eSBUZWFtIDxzZWN1cml0eUBzdXNlLmRlPokBFQMFEDbhLUfkWLKHsco8
> RQEBVw4H/1vIdiOLX/7hdzYaG9crQVIk3QwaB5eBbjvLEMvuCZHiY2COUg5QdmPQ
> 8SlWNZ6k4nu1BLcv2g/pymPUWP9fG4tuSnlUJDrWGm3nhyhAC9iudP2u1YQY37Gb
> B6NPVaZiYMnEb4QYFcqv5c/r2ghSXUTYk7etd6SW6WCOpEqizhx1cqDKNZnsI/1X
> 11pFcO2N7rc6byDBJ1T+cK+F1Ehan9XBt/shryJmv04nli5CXQMEbiqYYMOu8iaA
> 8AWRgXPCWqhyGhcVD3LRhUJXjUOdH4ZiHCXaoF3zVPxpeGKEQY8iBrDeDyB3wHmj
> qY9WCX6cmogGQRgYG6yJqDalLqrDOdmJARUDBRA24S0Ed7LmAD0l09kBAW04B/4p
> WH3f1vQn3i6/+SmDjGzUu2GWGq6Fsdwo2hVM2ym6CILeow/K9JfhdwGvY8LRxWRL
> hn09j2IJ9P7H1Yz3qDf10AX6V7YILHtchKT1dcngCkTLmDgC4rs1iAAl3f089sRG
> BafGPGKv2DQjHfR1LfRtbf0P7c09Tkej1MP8HtQMW9hPkBYeXcwbCjdrVGFOzqx+
> AvvJDdT6a+oyRMTFlvmZ83UV5pgoyimgjhWnM1V4bFBYjPrtWMkdXJSUXbR6Q7Pi
> RZWCzGRzwbaxqpl3rK/YTCphOLwEMB27B4/fcqtBzgoMOiaZA0M5fFoo54KgRIh0
> zinsSx2OrWgvSiLEXXYKiEYEEBECAAYFAjseYcMACgkQnkDjEAAKq6ROVACgjhDM
> /3KM+iFjs5QXsnd4oFPOnbkAnjYGa1J3em+bmV2aiCdYXdOuGn4ZiQCVAwUQN7c7
> whaQN/7O/JIVAQEB+QP/cYblSAmPXxSFiaHWB+MiUNw8B6ozBLK0QcMQ2YcL6+Vl
> D+nSZP20+Ja2nfiKjnibCv5ss83yXoHkYk2Rsa8foz6Y7tHwuPiccvqnIC/c9Cvz
> dbIsdxpfsi0qWPfvX/jLMpXqqnPjdIZErgxpwujas1n9016PuXA8K3MJwVjCqSKI
> RgQQEQIABgUCOhpCpAAKCRDHUqoysN/3gCt7AJ9adNQMbmA1iSYcbhtgvx9ByLPI
> DgCfZ5Wj+f7cnYpFZI6GkAyyczG09sE=
> =LRKC
> - -----END PGP PUBLIC KEY BLOCK-----
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.2 (GNU/Linux)
>
> iQEVAwUBQ5V3B3ey5gA9JdPZAQJZkgf9HaTAuew58a6H/AoTc4ukxp23L6UI1moZ
> 4Z7kZRTE/+BTK54QAyAswj9ad428jBJeVJC1tsIfP/vaZhl4nJ3ML99lPJHt2FBq
> 3qsuQgK2aXxCR1UlURlUPR6NWeXvHxIY3LBdW+ngQRYKNASkB2AZ9az0Z771OaTx
> lIAa2KQMFP9lAyftLFlkfqcZI9zewCqAy5r657koyv2SjPdNaK0O8dtW+kX35LvF
> x9AgxJCSJgtEf7ZOGXsHmvcFaoHftiy6S21ddgzNHLPEGCZg54yAMDVyR2TT0kWs
> ml/91KJTIvuVb0wssECS9cJhIvOlNyrY3wEbUk5xwT6SbGnMX2et8Q==
> =XMU5
> -----END PGP SIGNATURE-----

  1. 2005-12-02 From: <mlr52-at-michaellrichardson.com> Subject: [NYLXS - HANGOUT] Another Blow to E-VotingCompany
  2. 2005-12-02 From: <mlr52-at-mycouponmagic.com> Subject: [NYLXS - HANGOUT] Fwd: Fw: (no subject)
  3. 2005-12-05 Contrarian <adrba-at-nyct.net> Subject: [NYLXS - HANGOUT] Richard Stallman at FreeCultureNYU demonstration last Wed.
  4. 2005-12-05 Ruben Safir <ruben-at-mrbrklyn.com> Re: [NYLXS - HANGOUT] Richard Stallman at FreeCultureNYU
  5. 2005-12-05 Ruben Safir <ruben-at-mrbrklyn.com> Re: [NYLXS - HANGOUT] Richard Stallman at FreeCultureNYU
  6. 2005-12-05 Contrarian <adrba-at-nyct.net> Re: [NYLXS - HANGOUT] Richard Stallman at FreeCultureNYU demonstration
  7. 2005-12-05 Billy <billy-at-dadadada.net> Re: [NYLXS - HANGOUT] Richard Stallman at FreeCultureNYU demonstration
  8. 2005-12-06 Contrarian <adrba-at-nyct.net> Re: [NYLXS - HANGOUT] Richard Stallman at FreeCultureNYU demonstration
  9. 2005-12-06 Ruben Safir <ruben-at-mrbrklyn.com> Re: [NYLXS - HANGOUT] Richard Stallman at FreeCultureNYU
  10. 2005-12-06 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] [Fwd: [suse-security-announce] SUSE Security Announcement: kernel
  11. 2005-12-07 From: "Inker, Evan" <EInker-at-gam.com> Subject: [NYLXS - HANGOUT] U.S. Jewish hip-hop artists rap on Torah, Chanukah
  12. 2005-12-07 Billy <billy-at-dadadada.net> Re: [NYLXS - HANGOUT] Richard Stallman at FreeCultureNYU demonstration
  13. 2005-12-07 Contrarian <adrba-at-nyct.net> Re: [NYLXS - HANGOUT] $100 laptops with a hand crank.... (fwd)
  14. 2005-12-07 From: "rc" <ray-pub-at-rcn.com> RE: [NYLXS - HANGOUT] Richard Stallman at FreeCultureNYUdemonstration last Wed.
  15. 2005-12-07 Ruben Safir <ruben-at-mrbrklyn.com> RE: [NYLXS - HANGOUT] Richard Stallman at
  16. 2005-12-07 Ruben Safir <ruben-at-mrbrklyn.com> Re: [NYLXS - HANGOUT] Richard Stallman at
  17. 2005-12-07 Billy <billy-at-dadadada.net> Re: [NYLXS - HANGOUT] Richard Stallman at FreeCultureNYU demonstration
  18. 2005-12-08 Ruben Safir <ruben-at-mrbrklyn.com> RE: [NYLXS - HANGOUT] Richard Stallman at
  19. 2005-12-08 From: <mlr52-at-michaellrichardson.com> Subject: [NYLXS - HANGOUT] I Want one.
  20. 2005-12-09 From: "Yolande Hill" <kvjzhangout-at-mrbrklyn.com> Best Choice Rx - Free Online Prescriptions - FedExed Overnight
  21. 2005-12-09 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] [Fwd: [Hardhats-members] [Fwd: [Fwd: Call for Papers: The Use of
  22. 2005-12-09 From: "rc" <ray-pub-at-rcn.com> RE: [NYLXS - HANGOUT] Richard Stallman atFreeCultureNYUdemonstration last Wed.
  23. 2005-12-09 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] [Fwd: DRM protest tomorrow, 3pm-5pm outside Virgin Records in
  24. 2005-12-09 Ruben Safir <ruben-at-mrbrklyn.com> RE: [NYLXS - HANGOUT] Richard Stallman
  25. 2005-12-10 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] [Fwd: JobCircle Weekly Summary of New Jobs]
  26. 2005-12-10 From: "J.E. Cripps" <cycmn-at-nyct.net> Re: [NYLXS - HANGOUT] [Fwd: DRM protest tomorrow, 3pm-5pm outside
  27. 2005-12-12 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] [Fwd: ISOC-NY Monthly Membership Meeting]
  28. 2005-12-12 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] Recreation
  29. 2005-12-12 Contrarian <adrba-at-nyct.net> Re: [NYLXS - HANGOUT] Recreation
  30. 2005-12-12 Ruben Safir <ruben-at-mrbrklyn.com> Re: [NYLXS - HANGOUT] Recreation
  31. 2005-12-12 hangout-at-mrbrklyn.com Re: [NYLXS - HANGOUT] Recreation
  32. 2005-12-12 hangout-at-mrbrklyn.com Re: [NYLXS - HANGOUT] Recreation
  33. 2005-12-12 Ruben Safir <ruben-at-mrbrklyn.com> Re: [NYLXS - HANGOUT] Recreation
  34. 2005-12-12 swd <sderrick-at-optonline.net> Subject: [NYLXS - HANGOUT] Jobs (LINUX and other)
  35. 2005-12-16 From: "Inker, Evan" <EInker-at-gam.com> Subject: [NYLXS - HANGOUT] OSDL cautiously optimistic on desktop Linux
  36. 2005-12-16 Ruben Safir <ruben-at-mrbrklyn.com> Re: [NYLXS - HANGOUT] OSDL cautiously optimistic on desktop Linux
  37. 2005-12-17 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] For the newxt Free Software Institute Meeting
  38. 2005-12-17 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] Custom GNU/Linux Video Machine
  39. 2005-12-18 From: <mlr52-at-michaellrichardson.com> Subject: [NYLXS - HANGOUT] Tale of Espionage Marks a'Bizarre' Turn in N. Ireland
  40. 2005-12-18 Billy <billy-at-dadadada.net> Re: [NYLXS - HANGOUT] Tale of Espionage Marks a'Bizarre' Turn in
  41. 2005-12-18 Billy <billy-at-dadadada.net> Re: [NYLXS - HANGOUT] Tale of Espionage Marks a'Bizarre' Turn in
  42. 2005-12-18 From: <mlr52-at-michaellrichardson.com> Re: [NYLXS - HANGOUT] Tale of Espionage Marks a'Bizarre' Turn in N. Ireland
  43. 2005-12-20 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] [Fwd: [suse-security-announce] SUSE Security Announcement:
  44. 2005-12-20 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] I Hate This Mayor
  45. 2005-12-21 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] Re: Borrow a computer?
  46. 2005-12-21 swd <sderrick-at-optonline.net> Re: [NYLXS - HANGOUT] Re: Borrow a computer?
  47. 2005-12-22 swd <sderrick-at-optonline.net> Re: [NYLXS - HANGOUT] Re: Borrow a computer?
  48. 2005-12-22 Ruben Safir <ruben-at-mrbrklyn.com> Re: [NYLXS - HANGOUT] Re: Borrow a computer?
  49. 2005-12-22 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] [Fwd: E-Update for the Committee on Technology in Government -
  50. 2005-12-22 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] Re: Borrow a computer?
  51. 2005-12-23 From: "Steve Milo" <slavik914-at-rennlist.net> Subject: [NYLXS - HANGOUT] Anyone care to make sense of this?
  52. 2005-12-26 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] Pricing of Downloaded Songs Prompts Antitrust Subpoenas
  53. 2005-12-26 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] There is Blood in your wine (We like our bears on flags)
  54. 2005-12-26 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] There is Blood in your wine (We like our bears on flags)
  55. 2005-12-26 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] Pricing of Downloaded Songs Prompts Antitrust Subpoenas
  56. 2005-12-27 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] The cost of Justice in the digital age.
  57. 2005-12-27 From: "Inker, Evan" <EInker-at-gam.com> Subject: [NYLXS - HANGOUT] Whose up to go drinking?
  58. 2005-12-27 Contrarian <adrba-at-nyct.net> Re: [NYLXS - HANGOUT] Whose up to go drinking?
  59. 2005-12-28 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] Free Software faults part 3
  60. 2005-12-28 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] Free Software Faults Part 2
  61. 2005-12-28 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [NYLXS - HANGOUT] New Digital Camera with GNU/Linux
  62. 2005-12-30 mlr52-at-michaellrichardson.com Subject: [NYLXS - HANGOUT] [FWD: Richard Stallman to speak at GNUbies Jan 4, 2006]

NYLXS are Do'ers and the first step of Doing is Joining! Join NYLXS and make a difference in your community today!