Debian: minimalist Unsanitized input vulnerability
Summary
Package : minimalist
Vulnerability : unsanitised input
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2003-0902
A security-related problem has been discovered in minimalist, a
mailing list manager, which allows a remote attacker to execute
arbitrary commands.
For the stable distribution (woody) this problem has been fixed in
version 2.2-4.
For the unstable distribution (sid) this problem has been fixed in
version 2.4-1.
We recommend that you upgrade your minimalist package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
Size/MD5 checksum: 867 c068640f2b93412e07368555a63d9b14
Size/MD5 checksum: 2583 2779834a5def11d42c31843cf50f7d4e
Size/MD5 checksum: 18135 cda434d02c6a8bd5ed7220af71613d40
Architecture independent components:
Size/MD5 checksum: 25608 e4b9822b1af1cf3e3d4f3dc353dd012d
These files will probably be moved into the stable distribution on
its next revision.
For apt-get: deb Debian -- Security Information stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)
iD8DBQE/uIXlW5ql+IAeqTIRAns4AJ9/sHNmRhNvP9RrWQos3JX9YOPACgCcCMCS
NJfyBXT8kkNuqqjQ3kT1VUw=3/UQ
-----END PGP SIGNATURE-----