Debian Security Advisory: Correction: New version of wu-ftpd releasedJan 24, 2001, 20:46 (0 Talkback[s])
(Other stories by Martin Schulze)
WEBINAR: On-demand Event
Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >
Date: Wed, 24 Jan 2001 08:15:42 +0100
Debian Security Advisory DSA-016-3 email@example.com http://www.debian.org/security/ Martin Schulze January 24, 2001
Package : wu-ftpd Vulnerability : temp file creation and format string Debian-specific: noSecurity people at WireX have noticed a temp file creation bug and the WU-FTPD development team has found a possible format string bug in wu-ftpd. Both could be remotely exploited, though no such exploit exists currently.
This additional advisory only announces a recompile of the package for the Intel ia32 architecture. The upload from yesterday was lacking PAM support. This only required a recompile and contains no other fixes. (Sorry, but when I make a mistake, I have to make it real, this time it's the correct file).
For upgrading please use
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.Or use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
Intel ia32 architecture:
http://security.debian.org/dists/stable/updates/main/binary-i386/wu-ftpd_2.6.0-5.2.1_i386.deb MD5 checksum: e0521153d6c9c23082edb29cc8d03fd3
These files will be moved into ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.
For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
For apt-get: deb http://security.debian.org/
0 Talkback[s] (click to add your comment)