Re: [Admin/Spamassasin] Re: PHP Security Advisory: Vulnerability in PHP versions 4.2.0 and 4.2.1

From: Steven Champeon (schampeoat_private)
Date: Tue Jul 23 2002 - 17:13:00 PDT

  • Next message: EnGarde Secure Linux: "[ESA-20020724-018] Buffer overflow in BIND4-derived resolver code."

    on Mon, Jul 22, 2002 at 09:39:22PM +0200, Lupe Christoph wrote:
    > On Monday, 2002-07-22 at 13:59:57 +0300, Marko Karppinen wrote:
    > > SPAM: -------------------- Start SpamAssassin results ----------------------
    > > SPAM: This mail is probably spam.  The original message has been altered
    > > SPAM: so you can recognise or block similar unwanted mail in future.
    > > SPAM: See http://spamassassin.org/tag/ for more details.
    > > SPAM: 
    > > SPAM: Content analysis details:   (5.7 hits, 5 required)
    > > SPAM: Hit! (2.7 points)  Subject contains lots of white space
    > > SPAM: Hit! (3.0 points)  Listed in Razor, see http://razor.sourceforge.net/
    > > SPAM: 
    > > SPAM: -------------------- End of SpamAssassin results ---------------------
    > > 
    > > 
    > >    PHP Security Advisory: Vulnerability in PHP versions 4.2.0 and 4.2.1
    > 
    > Will people on this list please refrain from putting other people's
    > mail on Razor? It's *not* helpful when important announcements end
    > up in the bit bucket, to be found when the bucket's owner gets
    > around to empty it.
    
    Will people using SpamAssassin and Razor please whitelist important
    lists, as it is plain that for a wide variety of reasons, false
    positives will end up in Razor from time to time? It is very helpful
    to properly implement one's own spam policy, instead of complaining
    that others have not.
    
    Thanks,
    Steve
    
    -- 
    hesketh.com/inc. v: (919) 834-2552 f: (919) 834-2554 w: http://hesketh.com
    



    This archive was generated by hypermail 2b30 : Wed Jul 24 2002 - 12:01:19 PDT