Re: [SECURITY] [DSA 122-1] New zlib & other packages fix buffer overflow
Unless your are going to dial into a malicious ISP, I doubt this will be a
problem (AFAIK, but don't quote me).
Most of my servers are stable/testing hybrids, including 2 running 2.4 (and
I have been very happy with them).
Update your sources.list to have both stable and testing (and make sure you
called them that, not potato/woody), and then do an "apt-get install apt".
Which will install testing's apt onto your stable box, along with any
dependencies.
Then add this to your apt.conf file:
APT::Default-Release "stable";
You can then install packages (and dependencies) from testing via "apt-get
install ssh -t testing". Otherwise packages will be pulled from stable.
Andrew Tait
System Administrator
Country NetLink Pty, Ltd
E-Mail: andrewt@cnl.com.au
WWW: http://www.cnl.com.au
30 Bank St Cobram, VIC 3644, Australia
Ph: +61 (03) 58 711 000
Fax: +61 (03) 58 711 874
"It's the smell! If there is such a thing." Agent Smith - The Matrix
----- Original Message -----
From: "Chuck Peters" <cp@ccil.org>
To: <security@debian.org>; <debian-security@lists.debian.org>
Sent: Tuesday, March 12, 2002 5:07 PM
Subject: Re: [SECURITY] [DSA 122-1] New zlib & other packages fix buffer
overflow
>
> ii ppp 2.4.1-0.bunk.2 Point-to-Point Protocol (PPP) daemon.
>
> How does this affect ppp servers running potato with the unofficial 2.4
> packages provided by Adrian Bunk?
>
> Does anyone have any recommendations for fixing this potential exploit?
>
>
> Thanks,
> Chuck
>
>
> --
> To UNSUBSCRIBE, email to debian-security-request@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact
listmaster@lists.debian.org
>
>
Reply to: