[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[debian-users:27233] [SECURITY] [DSA 029-2] New proftpd packages for m68k available (from debian-security-announce@lists.debian.org)
debian-security-announce@lists.debian.orgに、
[DSA 029-1](proftpdのさまざまな弱点について)の補足が流れました。
これは、[DSA 029-1]で欠けていた、m68k用パッケージの情報です。
(Webのほうには記述されています)
修正済みバージョンは1.2.0pre10-2potato1です。このバージョンへの
アップデートをおすすめします。
以下、アナウンスの引用です。
From: Martin Schulze <joey@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
Subject: [SECURITY] [DSA 029-2] New proftpd packages for m68k available
Date: Tue, 6 Mar 2001 03:14:53 +0100
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> - ----------------------------------------------------------------------------
> Debian Security Advisory DSA-029-2 security@debian.org
> http://www.debian.org/security/ Martin Schulze
> March 6, 2001
> - ----------------------------------------------------------------------------
>
> Package : proftpd
> Vulnerability : remote DOS & potential buffer overflow
> Debian-specific: no
>
> In Debian Security Advisory DSA 029-1 we have reported several
> vulnerabilities in proftpd that have been fixed. For details please
> read the main advisory. This upload fixes:
>
> 1. A memory leak which can result in a denial of service, as reported
> by Wojciech Purczynski. The default configuration of proftpd
> in Debian is not vulnerable.
>
> 2. A similar memory leak affects the USER command, also as reported
> by Wojciech Purczynski.
>
> 3. Format string vulnerabilities reported by Przemyslaw Frasunek.
>
> The most recent advisory covering proftpd missed one architecture that
> was released with Debian GNU/Linux 2.2. Therefore this advisory is
> only an addition to DSA 029-1 and only adds the relevant package for
> the Motorola 680x0 architecture.
>
> We recommend you upgrade your sudo packages for m68k immediately.
>
> wget url
> will fetch the file for you
> dpkg -i file.deb
> will install the referenced file.
>
> You may use an automated update by adding the resources from the
> footer to the proper configuration.
(中略)
> - ----------------------------------------------------------------------------
> For apt-get: deb http://security.debian.org/ stable/updates main
> For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
> Mailing list: debian-security-announce@lists.debian.org
> Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
以上です。
--
喜瀬“冬猫”浩@南国沖縄