Ok, here is a set of RPMs that updates proftpd to 1.2.1. This is to address a vulnerability found with the <Limit> directive. Any feedback on these RPMs would be appreciated. RPMs are available: i386: (Qube3, RaQ3, RaQ4, XTR, CacheRaQ4) ftp://ftp.cobaltnet.com/pub/experimental/RPMS/i386/proftpd-1.2.1-C1.i386.rpm mips w/ PAM: (RaQ2) ftp://ftp.cobaltnet.com/pub/experimental/RPMS/mips/proftpd-1.2.1-C1.mips.rpm mips w/o PAM: (RaQ1, Qube2) ftp://ftp.cobaltnet.com/pub/experimental/RPMS/mips/proftpd-1.2.1-C1-NOPAM.mips.rpm SRPMS: i386: (Qube3, RaQ3, RaQ4, XTR, CacheRaQ4) ftp://ftp.cobaltnet.com/pub/experimental/SRPMS/i386/proftpd-1.2.1-C1.src.rpm mips w/ PAM: (RaQ2) ftp://ftp.cobaltnet.com/pub/experimental/SRPMS/mips/proftpd-1.2.1-C1.src.rpm mips w/o PAM: (RaQ1, Qube2) ftp://ftp.cobaltnet.com/pub/experimental/SRPMS/mips/proftpd-1.2.1-C1-NOPAM.src.rpm As usual, these RPMs are considered experimental and unsupported until an official pkg file from Cobalt is posted to the website. Jeff -- Jeff Lovell Sun Microsystems Server Appliance Business Unit _______________________________________________ cobalt-security mailing list [EMAIL PROTECTED] http://list.cobalt.com/mailman/listinfo/cobalt-security
