[Previo por Fecha] [Siguiente por Fecha] [Previo por Hilo] [Siguiente por Hilo]
[Hilos de Discusión] [Fecha] [Tema] [Autor]------- Start of forwarded message ------- Return-Path: <redhat-announce-list-request en redhat com> Resent-Cc: recipient list not shown: ; MBOX-Line: From redhat-announce-list-request en redhat com Mon Mar 9 14:49:25 1998 X-Authentication-Warning: mercury.redhat.com: ewt owned process doing -bs Date: Mon, 9 Mar 1998 14:49:53 -0500 (EST) From: Erik Troan <ewt en redhat com> Reply-To: redhat-list en redhat com To: redhat-announce-list en redhat com Subject: SECURITY: New perl 5.004 packages now available Approved: ewt en redhat com MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Resent-From: redhat-announce-list en redhat com X-Mailing-List: <redhat-announce-list en redhat com> archive/latest/12 X-Loop: redhat-announce-list en redhat com Precedence: list Resent-Sender: redhat-announce-list-request en redhat com X-URL: http://www.redhat.com All versions of perl for Red Hat Linux have /tmp symlink attacks. New packages are available for Red Hat 4.2 and Red Hat 5.0 which fix these problems. All users of Red Hat Linux are encouraged to upgrade to the new perl releases immediately. As always, these packages have been signed with the Red Hat PGP key. Thanks to the contributors of BUGTRAQ for finding and fixing this bug. Erik Red Hat 5.0 - ------------- i386: rpm -Uvh ftp://ftp.redhat.com/updates/5.0/i386/perl-5.004-3.i386.rpm alpha: rpm -Uvh ftp://ftp.redhat.com/updates/5.0/alpha/perl-5.004-3.alpha.rpm Red Hat 4.2 - ------------- i386: rpm -Uvh ftp://ftp.redhat.com/updates/4.2/i386/perl-5.004-0.1.i386.rpm alpha: rpm -Uvh ftp://ftp.redhat.com/updates/4.2/alpha/perl-5.004-0.1.alpha.rpm SPARC: rpm -Uvh ftp://ftp.redhat.com/updates/4.2/sparc/perl-5.004-0.1.sparc.rpm - -- To unsubscribe: mail -s unsubscribe redhat-announce-list-request en redhat com < /dev/null ------- End of forwarded message -------