Debian: 'man-db' format string vulnerability
Summary
Styx has reported that the program `man' mistakenly passes malicious
strings (i.e. containing format characters) through routines that were
not meant to use them as format strings. Since this could cause a
segmentation fault and privileges were not dropped it may lead to an
exploit for the 'man' user.
We recommend you upgrade your man-db package immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
------------------------------------
Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
architectures.
Source archives:
MD5 checksum: 2b9918131917984b87fcee9ddc08fb2e
MD5 checksum: c6c5931bd70a34d8b6df5d09736a6110
Intel ia32 architecture:
MD5 checksum: ef897ea4450eb06089ae87213177d5fa
Motorola 680x0 architecture:
MD5 checksum: 3f12e53dfbf896eba06296403363c977
Sun Sparc architecture:
MD5 checksum: ab357a472d57c7668992f0f5b0395d93
Alpha architecture:
MD5 checksum: cde9367a123c74ff40970beb66d3dedb
PowerPC architecture:
MD5 checksum: 5aad8020aa268abf5c283537cb78eda2
ARM architecture:
MD5 checksum: c7980061b9e8a5d95191befcd93e5d0e
These files will be moved into
soon.
For not yet released architectures please refer to the appropriate
directory .
----------------------------------------------------------------------------
For apt-get: deb Debian -- Security Information stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show