Debian: 'man-db' format string vulnerability
Summary
Styx has reported that the program `man' mistakenly passes malicious
strings (i.e. containing format characters) through routines that were
not meant to use them as format strings. Since this could cause a
segmentation fault and privileges were not dropped it may lead to an
exploit for the 'man' user.
We recommend you upgrade your man-db package immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
------------------------------------
Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
architectures.
Source archives:
MD5 checksum: 2b9918131917984b87fcee9ddc08fb2e
MD5 checksum: c6c5931bd70a34d8b6df5d09736a6110
Intel ia32 architecture:
MD5 checksum: ef897ea4450eb06089ae87213177d5fa
Motorola 680x0 architecture:
MD5 checksum: 3f12e53dfbf8...