Debian: 'wu-ftpd' vulnerabilities
Summary
Security people at WireX have noticed a temp file creation bug and the
WU-FTPD development team has found a possible format string bug in
wu-ftpd. Both could be remotely exploited, though no such exploit
exists currently.
We recommend you upgrade your wu-ftpd package immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
architectures.
Source archives:
MD5 checksum: 652cfe4b59e0468eded736e7c281d16f
MD5 checksum: a63f505372cbd5c3d2e0404f7f18576f
MD5 checksum: af6e196640d429f400810aaf016d144c
Intel ia32 architecture:
MD5 checksum: 5cdd2172e1b2459f1115cf034c91fe40
Motorola 680x0 architecture:
MD5 checksum: 60192b7386401ddbbb4ada8776e887ec
Sun Sparc architecture:
MD5 checksum: 4e7a1c8eb667f3ef40b858ca7833bc14
Alpha architecture:
MD5 checksum: f5bf5286952e8812b94a692efe6308e0
PowerPC architecture:
MD5 checksum: 15683a1a12381aa5c9b15b108fe6a579
ARM architecture:
MD5 checksum: 0d32fa96a7eb8d42dd0216876c894335
Architecture independent:
MD5 checksum: 6974913b3783fedff98e65341e0464be
These files will be moved into
soon.
For not yet released architectures please refer to the appropriate
directory .
For apt-get: deb Debian -- Security Information stable/updates main
For dpkg-ftp: dists/stable/updates/main
Package info: `apt-cache show