[SECURITY] New versions of proftpd fixes buffer overflow
-----BEGIN PGP SIGNED MESSAGE-----
We have received reports that the proftpd package as distributed
in Debian GNU/Linux 2.0 is vulnerable to a buffer overflow. Using this
vulnerability, known as palmetto, it is possible to gain shell access or
otherwise circumvent normal login access and logging mechanisms.
This has been fixed in version 1.2.0pre1-2
We recommend you upgrade your proftpd package immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
Debian GNU/Linux 2.0 alias hamm
- -------------------------------
This version of Debian was released only for the Intel and the
Motorola 680x0 architecture.
Source archives:
ftp://ftp.debian.org/debian/dists/proposed-updates/proftpd_1.2.0pre1.orig.tar.gz
MD5 checksum: 40695cf2ce6a7ff70e36e2c4d140a50e
ftp://ftp.debian.org/debian/dists/proposed-updates/proftpd_1.2.0pre1-2.diff.gz
MD5 checksum: b9709fc768ba863bef08729325a9c53a
ftp://ftp.debian.org/debian/dists/proposed-updates/proftpd_1.2.0pre1-2.dsc
MD5 checksum: a2245a4681873caad9dd83002e653bb0
Intel architecture:
ftp://ftp.debian.org/debian/dists/proposed-updates/proftpd_1.2.0pre1-2_i386.deb
MD5 checksum: 6fa9921e694972015d4e3d34184c4f2b
Motorola 680x0 architecture:
ftp://ftp.debian.org/debian/dists/proposed-updates/proftpd_1.2.0pre1-2_m68k.
MD5 checksum: 52053f8b9f348ff1929db91951cf394f
These files will be moved into
ftp://ftp.debian.org/debian/dists/hamm/*/binary-$arch/ soon.
For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
- --
Debian GNU/Linux . Security Managers . security@debian.org
debian-security-announce@lists.debian.org
Christian Hudon . Wichert Akkerman . Martin Schulze
<chrish@debian.org> . <wakkerma@debian.org> . <joey@debian.org>
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv
iQB1AwUBNsNh4qjZR/ntlUftAQF9aAMAqyjBrarrOWFPeEGFziipnsv2ycG8kHZv
iczaGOtJdO11zewN3Qj3y4+K0cke67uVjw92asRvVTzeRlmh8xmar+cp04vYA96p
BfI7zd/kRmpNV+35Xq0wWKPxU4iUVkSU
=EPwU
-----END PGP SIGNATURE-----
Reply to: