Debian Security Advisory [email protected] http://www.debian.org/security/ Michael Stone September 11, 2000
Package: libpam-smb Vulnerability: remote root exploit Debian-specific: no
libpam-smb contains a buffer overflow that can be used to execute
arbitrary commands with root privilege. libpam-smb was not shipped
with Debian 2.1 (slink), but was included in Debian 2.2 (potato).
A fixed version of libpam-smb is available in version 1.1.6-1
for Debian 2.2 (potato). We recommend upgrading your libpam-smb
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.1 alias slink
Debian 2.1 did not include libpam-smb.
Debian GNU/Linux 2.2 alias potato
Potato was released for the alpha, arm, i386, m68k, powerpc and
sparc architectures. At this moment packages for m68k are not yet
available. As soon as they are ready we will put them online and
list them on the security pages at
MD5 checksum: 6105db037fe3503c04cba3e08150c448
MD5 checksum: c83845843024a062c692c2c0d5887485
MD5 checksum: 7d18363b7ab932f852f670b4aeed1283
MD5 checksum: bc93244ff451f7c14e194d538eacef04
MD5 checksum: f2ae975ab2916376466d7a23bbc4dc66
Intel ia32 architecture:
MD5 checksum: c4e884fd29c7e726b85d636a8f22688c
MD5 checksum: cd4731e20045da27eac56a64b5feab63
Sun Sparc architecture:
MD5 checksum: 71759e4ae9bfd4d1cc3788869084f10f
For not yet released architectures please refer to the
appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/
For apt-get: deb
Mailing list: [email protected]