Debian Security Advisory: New version of libpam-smb releasedSep 12, 2000, 05:39 (0 Talkback[s])
(Other stories by Michael Stone)
Date: Mon, 11 Sep 2000 22:30:28 -0500
Debian Security Advisory firstname.lastname@example.org http://www.debian.org/security/ Michael Stone September 11, 2000
Package: libpam-smb Vulnerability: remote root exploit Debian-specific: nolibpam-smb contains a buffer overflow that can be used to execute arbitrary commands with root privilege. libpam-smb was not shipped with Debian 2.1 (slink), but was included in Debian 2.2 (potato).
A fixed version of libpam-smb is available in version 1.1.6-1 for Debian 2.2 (potato). We recommend upgrading your libpam-smb immediately.
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 2.1 alias slink
Debian 2.1 did not include libpam-smb.
Debian GNU/Linux 2.2 alias potato
Potato was released for the alpha, arm, i386, m68k, powerpc and
sparc architectures. At this moment packages for m68k are not yet
available. As soon as they are ready we will put them online and
list them on the security pages at
Intel ia32 architecture:
Sun Sparc architecture:
For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
For apt-get: deb
0 Talkback[s] (click to add your comment)