Debian: 'mgetty' vulnerability
Summary
In Debian Security Advisory DSA 011-1 we have reported insecure
creation of temporary files in the mgetty package that have been
fixed. For details please read the main advisory.
The most recent advisory covering proftpd missed two architectures that
were released with Debian GNU/Linux 2.2. Therefore this advisory is
only an addition to DSA 011-1 and only adds the relevant package for
the Motorola 680x0 and PowerPC architecture.
We recommend you upgrade your sudo packages for m68k immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
------------------------------------
Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
architectures.
Motorola 680x0 architecture:
MD5 checksum: c175cdd07927e5a6e9f6ebecbd91366b
MD5 checksum: 8aa48ed8b00d7873452cac3970c47877
...