On Sat, May 30, 1998 at 06:53:48PM +0200, Martin Schulze wrote:
> We have received a report that premail uses temporary files in /tmp
> using unsecure methods for opening them. This is fixed in the new
> 0.45-4 release.
>
> We recommend you upgrade your samba package immediately.
^^^^^
This should read premail, of course. I apologize for the confusion.
> dpkg -i file.deb
> will install the referenced file.
>
> Debian GNU/Linux 1.3.1 alias bo
> -------------------------------
>
> Source archives:
> ftp://ftp://ftp.de.debian.org/debian-incoming/Incoming/premail_0.45-4.diff.gz
> MD5 checksum: 48e9f08119998c0b0aafe45fef0c9484
> ftp://ftp://ftp.de.debian.org/debian-incoming/Incoming/premail_0.45-4.dsc
> MD5 checksum: 34b0820c86fe5b58531ac6cb65613b01
> ftp://ftp.debian.org/debian/non-free/source/premail_0.45.orig.tar.gz
> MD5 checksum: 1b48789ec4d191e5bf403d798c0bae34
>
> All architectures:
> ftp://ftp://ftp.de.debian.org/debian-incoming/Incoming/premail_0.45-4_all.deb
> MD5 checksum: a5573cffe71dc728840ee1b31b4691b5
>
> These files from the incoming directory will be moved into
> ftp://ftp.debian.org/debian/bo-updates/binary-i386/ and
> ftp://ftp.debian.org/debian/non-free/binary-i386/ or
> ftp://ftp.debian.org/debian/contrib/binary-i386/ later.
>
The package is the same for 1.3.1 and pre2.0.
Regards,
Joey
--
Debian GNU/Linux . Security Managers . security@debian.org
debian-security-announce@lists.debian.org
Christian Hudon <chrish@debian.org> . Martin Schulze <joey@debian.org>
Attachment:
pgph8vHqPP0BT.pgp
Description: PGP signature