-----BEGIN PGP SIGNED MESSAGE-----
Debian Security Advisory DSA-025-1 [email protected]
https://www.debian.org/security/ Martin Schulze
January 28, 2001
Vulnerability : Missing PAM support
A former security upload of OpenSSH lacked support for PAM which lead
into people not being able to log in into their server. This was only
a problem on the sparc architecture.
We recommend you upgrade your ssh packages on sparc.
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
architectures. This is only a recompile for the sparc architecture
and thus no new source and no other binary packages are provided
Sun Sparc architecture:
MD5 checksum: 41fe81f3eb8e87741b2a1c5bc913eab4
MD5 checksum: 5a3201c862319b986daf4c3654be73cc
These files will be moved into
For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
For apt-get: deb https://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show ' and https://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see https://www.gnupg.org
-----END PGP SIGNATURE-----