On Sat, May 30, 1998 at 06:53:48PM +0200, Martin Schulze wrote: > We have received a report that premail uses temporary files in /tmp > using unsecure methods for opening them. This is fixed in the new > 0.45-4 release. > > We recommend you upgrade your samba package immediately. ^^^^^ This should read premail, of course. I apologize for the confusion. > dpkg -i file.deb > will install the referenced file. > > Debian GNU/Linux 1.3.1 alias bo > ------------------------------- > > Source archives: > ftp://ftp://ftp.de.debian.org/debian-incoming/Incoming/premail_0.45-4.diff.gz > MD5 checksum: 48e9f08119998c0b0aafe45fef0c9484 > ftp://ftp://ftp.de.debian.org/debian-incoming/Incoming/premail_0.45-4.dsc > MD5 checksum: 34b0820c86fe5b58531ac6cb65613b01 > ftp://ftp.debian.org/debian/non-free/source/premail_0.45.orig.tar.gz > MD5 checksum: 1b48789ec4d191e5bf403d798c0bae34 > > All architectures: > ftp://ftp://ftp.de.debian.org/debian-incoming/Incoming/premail_0.45-4_all.deb > MD5 checksum: a5573cffe71dc728840ee1b31b4691b5 > > These files from the incoming directory will be moved into > ftp://ftp.debian.org/debian/bo-updates/binary-i386/ and > ftp://ftp.debian.org/debian/non-free/binary-i386/ or > ftp://ftp.debian.org/debian/contrib/binary-i386/ later. > The package is the same for 1.3.1 and pre2.0. Regards, Joey -- Debian GNU/Linux . Security Managers . security@debian.org debian-security-announce@lists.debian.org Christian Hudon <chrish@debian.org> . Martin Schulze <joey@debian.org>
Attachment:
pgpV2js2Md5Ea.pgp
Description: PGP signature