[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]
(fwd) [SECURITY] [DSA-016-3] Correction: New version of wu-ftpd released
[The latest Debian update of wu-ftpd (with security fixes) was bust.
Please upgrade to this one instead -- Raju]
This is an RFC 1153 digest.
(1 message)
----------------------------------------------------------------------
Return-Path: <BUGTRAQ@xxxxxxxxxxxxxxxxx>
Approved-By: beng@xxxxxxxxxxxxxxxxx
Delivered-To: bugtraq@xxxxxxxxxxxxxxxxxxxxxxx
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.3.12i
X-Debian: PGP check passed for security officers
Priority: urgent
X-Mailing-List: <debian-security-announce@xxxxxxxxxxxxxxxx> archive/latest/193
X-Loop: debian-security-announce@xxxxxxxxxxxxxxxx
Precedence: list
Message-ID: <nuRZoB.A.TpG.adob6@murphy>
Reply-To: security@xxxxxxxxxx
Comments: Resent-From: debian-security-announce@xxxxxxxxxxxxxxxx
Comments: Originally-From: Martin Schulze <joey@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
From: debian-security-announce@xxxxxxxxxxxxxxxx
Sender: Bugtraq List <BUGTRAQ@xxxxxxxxxxxxxxxxx>
To: BUGTRAQ@xxxxxxxxxxxxxxxxx
Subject: [SECURITY] [DSA-016-3] Correction: New version of wu-ftpd released
Date: Tue, 23 Jan 2001 23:43:29 -0800
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ----------------------------------------------------------------------------
Debian Security Advisory DSA-016-3 security@xxxxxxxxxx
http://www.debian.org/security/ Martin Schulze
January 24, 2001
- ----------------------------------------------------------------------------
Package : wu-ftpd
Vulnerability : temp file creation and format string
Debian-specific: no
Security people at WireX have noticed a temp file creation bug and the
WU-FTPD development team has found a possible format string bug in
wu-ftpd. Both could be remotely exploited, though no such exploit
exists currently.
This additional advisory only announces a recompile of the package for
the Intel ia32 architecture. The upload from yesterday was lacking
PAM support. This only required a recompile and contains no other
fixes. (Sorry, but when I make a mistake, I have to make it real,
this time it's the correct file).
For upgrading please use
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
Or use an automated update by adding the resources from the footer to
the proper configuration.
Debian GNU/Linux 2.2 alias potato
- ------------------------------------
Intel ia32 architecture:
http://security.debian.org/dists/stable/updates/main/binary-i386/wu-ftpd_2.6.0-5.2.1_i386.deb
MD5 checksum: e0521153d6c9c23082edb29cc8d03fd3
These files will be moved into
ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.
- ----------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE6bn2HW5ql+IAeqTIRAlxRAJ9JIj0KvmI1mnY19lnUICUjzce8vwCfQMvS
rwEZYHHmhMiSVU1+4BdCwKA=
=JJUl
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to debian-security-announce-request@xxxxxxxxxxxxxxxx
with a subject of "unsubscribe". Trouble? Contact listmaster@xxxxxxxxxxxxxxxx
------------------------------
End of this Digest
******************
--
Raju Mathur raju@xxxxxxxxxxxxx http://kandalaya.org/