[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]

(fwd) [SECURITY] [DSA-016-3] Correction: New version of wu-ftpd released

[The latest Debian update of wu-ftpd (with security fixes) was bust.
Please upgrade to this one instead -- Raju]

This is an RFC 1153 digest.
(1 message)

Return-Path: <BUGTRAQ@xxxxxxxxxxxxxxxxx>
Approved-By: beng@xxxxxxxxxxxxxxxxx
Delivered-To: bugtraq@xxxxxxxxxxxxxxxxxxxxxxx
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.3.12i
X-Debian: PGP check passed for security officers
Priority: urgent
X-Mailing-List: <debian-security-announce@xxxxxxxxxxxxxxxx> archive/latest/193
X-Loop: debian-security-announce@xxxxxxxxxxxxxxxx
Precedence: list
Message-ID:  <nuRZoB.A.TpG.adob6@murphy>
Reply-To: security@xxxxxxxxxx
Comments:     Resent-From: debian-security-announce@xxxxxxxxxxxxxxxx
Comments:     Originally-From: Martin Schulze <joey@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
From: debian-security-announce@xxxxxxxxxxxxxxxx
Sender: Bugtraq List <BUGTRAQ@xxxxxxxxxxxxxxxxx>
To: BUGTRAQ@xxxxxxxxxxxxxxxxx
Subject:      [SECURITY] [DSA-016-3] Correction: New version of wu-ftpd released
Date:         Tue, 23 Jan 2001 23:43:29 -0800

Hash: SHA1

- ----------------------------------------------------------------------------
Debian Security Advisory DSA-016-3                       security@xxxxxxxxxx
http://www.debian.org/security/                               Martin Schulze
January 24, 2001
- ----------------------------------------------------------------------------

Package        : wu-ftpd
Vulnerability  : temp file creation and format string
Debian-specific: no

Security people at WireX have noticed a temp file creation bug and the
WU-FTPD development team has found a possible format string bug in
wu-ftpd.  Both could be remotely exploited, though no such exploit
exists currently.

This additional advisory only announces a recompile of the package for
the Intel ia32 architecture.  The upload from yesterday was lacking
PAM support.  This only required a recompile and contains no other
fixes.  (Sorry, but when I make a mistake, I have to make it real,
this time it's the correct file).

For upgrading please use

wget url
	will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

Or use an automated update by adding the resources from the footer to
the proper configuration.

Debian GNU/Linux 2.2 alias potato
- ------------------------------------

  Intel ia32 architecture:

      MD5 checksum: e0521153d6c9c23082edb29cc8d03fd3

  These files will be moved into
  ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.

- ----------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org


To UNSUBSCRIBE, email to debian-security-announce-request@xxxxxxxxxxxxxxxx
with a subject of "unsubscribe". Trouble? Contact listmaster@xxxxxxxxxxxxxxxx


End of this Digest

Raju Mathur          raju@xxxxxxxxxxxxx           http://kandalaya.org/