Debian: UPDATE: 'proftpd' vulnerabilities
Posted by LinuxSecurity.com Team   
Debian This is an update to the DSA-032-1 advisory. The powerpc packagethat was listed in that advisory was unfortunately compiled onthe wrong system which caused it to not work on a Debian GNU/Linux 2.2system.

------------------------------------------------------------------------
Debian Security Advisory DSA-032-2                   security@debian.org 
http://www.debian.org/security/                         Wichert Akkerman
March  9, 2001
------------------------------------------------------------------------


Package: proftpd
Vulnerability: proftpd running as root, /var symlink removal
Debian-specific: yes

This is an update to the DSA-032-1 advisory. The powerpc package
that was listed in that advisory was unfortunately compiled on
the wrong system which caused it to not work on a Debian GNU/Linux 2.2
system.

A fixed package with version 1.2.0pre10-2.0potato1.1 has been
installed on security.debian.org.

For information on the fixed vulnerabilities please see the DSA-032-1
advisory.


wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 2.2 alias potato
-------------------------------------

  PowerPC architecture:
     http://security.debian.org/dists/stable/updates/main/binary-powerpc/proftpd_1.2.0pre10-2.0potato1.1_powerpc.deb
      MD5 checksum: 710e1b324dc8962c14919d0e58078740

  These files will be moved into
   ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate
directory  ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .