Security vulnerability in ‘fte’ found.

From: Wichert Akkerman <[email protected]>

We have found that the fte package as supplied in our slink (frozen)
and potato (unstable) archives does not drop its root priviliges
after initializing the virtual console device. This allows all users
to read and write files with root priviliges, and execute all programs
as root.

A new package (version 0.46b-4.1) has been uploaded to fix this problem. 

We recommend that you upgrade your fte package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

Debian GNU/Linux 2.0 alias hamm

  The fte package in this release does not suffer from this problem.

Debian GNU/Linux 2.1 alias slink (not released yet)

  Source archives:
      MD5 checksum: 44c60f6b5b55c80f7634eb405f3707e5
      MD5 checksum: e8991ea4fe2e298b57432e80dc5fd0b8
      MD5 checksum: 255f2f8cd2c210b497fdcdb0b9f964ed

  Intel architecture:
      MD5 checksum: 0d3d146749f68b11f6aed19d64161bbe
      MD5 checksum: 39a33e02915d6cc594b9170d0fc9b0f8

  Motorola 680x0 architecture:
      MD5 checksum: 117675708c4b3b1afbdbac5e63c997b0
      MD5 checksum: 9c7fb9a6f7b89025afb8cfa63a4da0ec

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

Debian GNU/Linux      .   Security Managers      .   [email protected]
              [email protected]
  Christian Hudon     .     Wichert Akkerman     .     Martin Schulze
<[email protected]>   .   <[email protected]>  .   <[email protected]>