Security hole found in junkbuster program.
Nov 12, 1998, 04:23 (1 Talkback[s])
WEBINAR: On-demand Event
Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >
From the Debian security mailing list, Wichert Akkerman writes:
We have received reports that junkbuster had a couple buffer overflow
vulnerabilities. We fixed those in version 2.0-3.2. All later version
are also not vulnerable. The patches were backported from 2.0.2 .
We recommend you upgrade your junkbuster package immediately.
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
Debian GNU/Linux 2.0 alias hamm
This version of Debian was released only for the Intel and the
Motorola 68xxx architecture.
MD5 checksum: b6f523b4a3a43761e58f98b971c0ad15
MD5 checksum: 3a504521a91ef2e0e33d6c3a4a2352e8
MD5 checksum: 8b0582f3001967964343f1fa5fe4c7aa
MD5 checksum: 7bb42ed33c19f49788d232b13119dc40
Motorola 68xxx architecture:
MD5 checksum: e5bb0b3e5eae51140bcbd3b43f71b4cb
These files will be moved into
For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .