We have received reports that the proftpd package as distributed in Debian GNU/Linux 2.0 is vulnerable to a buffer overflow. Using this vulnerability, known as palmetto, it is possible to gain shell access or otherwise circumvent normal login access and logging mechanisms. This has been fixed in version 1.2.0pre1-2 We recommend you upgrade your proftpd package immediately. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. Debian GNU/Linux 2.0 alias hamm This version of Debian was released only for the Intel and the Motorola 680x0 architecture. Source archives: ftp://ftp.debian.org/debian/dists/propose d-updates/proftpd_1.2.0pre1.orig.tar.gz MD5 checksum: 40695cf2ce6a7ff70e36e2c4d140a50e ftp://ftp.debian.org/debian/dists/proposed- updates/proftpd_1.2.0pre1-2.diff.gz MD5 checksum: b9709fc768ba863bef08729325a9c53a ftp://ftp.debian.org/debian/dists/proposed- updates/proftpd_1.2.0pre1-2.dsc MD5 checksum: a2245a4681873caad9dd83002e653bb0 Intel architecture: ftp://ftp.debian.org/debian/dists/proposed- updates/proftpd_1.2.0pre1-2_i386.deb MD5 checksum: 6fa9921e694972015d4e3d34184c4f2b Motorola 680x0 architecture: ftp://ftp.debian.org/debian/dists/proposed- updates/proftpd_1.2.0pre1-2_m68k. MD5 checksum: 52053f8b9f348ff1929db91951cf394f These files will be moved into ftp://ftp.debian.org/debian/dists/hamm/*/binary-$arch/ soon. For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ . - -- Debian GNU/Linux . Security Managers . [email protected] [email protected] Christian Hudon . Wichert Akkerman . Martin Schulze . .