Debian: 'mc' vulnerability
Summary
It has been reported that a local user could tweak Midnight Commander
of another user into executing a random program under the user id of
the person running Midnight Commander. This behaviour has been fixed
by Andrew V. Samoilov.
We recommend you upgrade your mc package.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
------------------------------------
Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
architectures.
Source archives:
MD5 checksum: bd8823e83ef37ada13ad7fc4ca3479c8
MD5 checksum: c0e84f877cc4b4da15269811f1a538b4
MD5 checksum: 0d2e63dd4b0c0a3d4d6c5933187ba222
Intel ia32 architecture:
MD5 checksum: 2d2eb51e9ae833b605fc54711cd229fc
MD5 checksum: 45d65de62f5d7af29cf2ef3b9ab56fd8
MD5 checksum: c58a97f08556e...