Debian: 'uucp' vulnerability
Summary
zen-parse has found a problem with Taylor UUCP as distributed with
many GNU/Linux distributions. It was possible to make `uux' execute
`uucp' with malicious commandline arguments which gives an attacker
access to files owned by uid/gid uucp.
This problem has been fixed in version of 1.06.1-11potato1 for Debian
GNU/Linux 2.2 by using a patch that Red Hat has provided.
We recommend that you upgrade your uucp package immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
------------------------------------
Source archives:
MD5 checksum: 4e2f02a4abd2ce86ffb0e154ef5d162b
MD5 checksum: fd358e7e14f32ffa16cd3f2e6137b05c
MD5 checksum: 390af5277915fcadbeee74d2f3038af9
Alpha architecture:
MD5 checksum: c1ad1038530a5ee1a6fb92fb90be287f
ARM architecture:
MD5 checksum: 5821d1b6b9bccfa7486183216ffc7dfa
Intel ia32 architecture:
MD5 checksum: deb9d76651686c2b0a2d51488e3cf0da
Motorola 680x0 architecture:
MD5 checksum: 37f78dceb1e6c3b492246c888a744af7
PowerPC architecture:
MD5 checksum: e2a81774e4cd6c1eabbcf1c8fbf2e406
Sun Sparc architecture:
MD5 checksum: 28148692a588b9b0c9b7598d0084fd2a
These files will be moved into the stable distribution on its next
revision.
----------------------------------------------------------------------------
For apt-get: deb Debian -- Security Information stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show