---------------------------------------------------------------------------- Debian Security Advisory DSA-028-1 security@debian.org Debian -- Security Information Martin Schulze February 9, 2001 ---------------------------------------------------------------------------- Package : man-db Vulnerability : format string vulnerability Type : local exploit Debian-specific: no Styx has reported that the program `man' mistakenly passes malicious strings (i.e. containing format characters) through routines that were not meant to use them as format strings. Since this could cause a segmentation fault and privileges were not dropped it may lead to an exploit for the 'man' user. We recommend you upgrade your man-db package immediately. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 2.2 alias potato ------------------------------------ Potato was released for the alpha, arm, i386, m68k, powerpc and sparc architectures. Source archives: MD5 checksum: 2b9918131917984b87fcee9ddc08fb2e MD5 checksum: c6c5931bd70a34d8b6df5d09736a6110 Intel ia32 architecture: MD5 checksum: ef897ea4450eb06089ae87213177d5fa Motorola 680x0 architecture: MD5 checksum: 3f12e53dfbf896eba06296403363c977 Sun Sparc architecture: MD5 checksum: ab357a472d57c7668992f0f5b0395d93 Alpha architecture: MD5 checksum: cde9367a123c74ff40970beb66d3dedb PowerPC architecture: MD5 checksum: 5aad8020aa268abf5c283537cb78eda2 ARM architecture: MD5 checksum: c7980061b9e8a5d95191befcd93e5d0e These files will be moved into soon. For not yet released architectures please refer to the appropriate directory . ---------------------------------------------------------------------------- For apt-get: deb Debian -- Security Information stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show' and http://packages.debian.org/