Debian: 'wu-ftpd' vulnerabilities
Summary
Security people at WireX have noticed a temp file creation bug and the
WU-FTPD development team has found a possible format string bug in
wu-ftpd. Both could be remotely exploited, though no such exploit
exists currently.
We recommend you upgrade your wu-ftpd package immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
architectures.
Source archives:
MD5 checksum: 652cfe4b59e0468eded736e7c281d16f
MD5 checksum: a63f505372cbd5c3d2e0404f7f18576f
MD5 checksum: af6e196640d429f400810aaf016d144c
Intel ia32 architecture:
MD5 checksum: 5cdd2172e1b2459f1115cf034c91fe40
Motorola 680x0 architecture:
MD5 checksum: 60192b7386401ddbbb4ada8776e887ec
Sun Sparc architecture:
...