[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

What is the status with wu-ftpd updated potato packages?



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello, 

I just signed up with the debian-security mailing list so I am not up to speed
with all the discussions.

What is the status with the wu-ftpd updated potato packages?  

I could find no mention of it on the debian main or security web pages and a
search of several mailing lists showed no mention to what is being done about
this exploit (The most recent wu-ftpd discussion was on Dec 4 / 6 in
debian-user).

Searching through the posts on the slashdot discussion made no mention of
updating the packages either (though they did recomend switching to proftpd or
even better bsd-ftpd which is based on openbsd).  

Announcements on bugtraq mention that debian is working on a patch, but
updated "stable/potato" packages have not been released yet.  I know redhat
released their announcement early, but it pains me to see redhat ahead of
debian on the security fix by almost 2 days.

Are there other sysadmins using wu-ftpd and if so what are they doing about
this vulnurability?

thanks,
donfede


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE8BuDCSeRbV/op2s4RAjaMAJ40rz/LyNcf6i+CHXd8jSBflAjHxwCeLfL8
zcfPbkaTdKAGMCnyVOe7YEU=
=9WdP
-----END PGP SIGNATURE-----



Reply to: