Debian Security Advisory: proftp runs as root, /var symlink removal

Date: Fri, 9 Mar 2001 00:57:48 +0100
From: Wichert Akkerman wichert@cistron.nl
To: debian-security-announce@lists.debian.org
Subject: [SECURITY] [DSA-032-2] proftp runs as root, /var symlink

Debian Security Advisory DSA-032-2                                      security@debian.org
http://www.debian.org/security/                                   Wichert Akkerman 
March  9, 2001

Package: proftpd
Vulnerability: proftpd running as root, /var symlink removal
Debian-specific: yes

This is an update to the DSA-032-1 advisory. The powerpc package
that was listed in that advisory was unfortunately compiled on the
wrong system which caused it to not work on a Debian GNU/Linux 2.2

A fixed package with version 1.2.0pre10-2.0potato1.1 has been
installed on security.debian.org.

For information on the fixed vulnerabilities please see the
DSA-032-1 advisory.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 2.2 alias potato

PowerPC architecture:


MD5 checksum: 710e1b324dc8962c14919d0e58078740

These files will be moved into ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/

For not yet released architectures please refer to the
appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/

For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis