Debian: 'tinyproxy' vulnerability
Summary
PkC have found a heap overflow in tinyproxy that could be remotely
exploited. An attacker could gain a shell (user nobody) remotely.
We recommend you upgrade your tinyproxy package immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
architectures.
Source archives:
MD5 checksum: 747119973db206dfa681357262b92e05
MD5 checksum: b7566742b8d8f4ff165463b6ab7d9855
MD5 checksum: b81229f1cb0212cb12e3bfdbaccdb820
Intel ia32 architecture:
MD5 checksum: e542b2d9f936912d2b5d39eb2adbf39d
Motorola 680x0 architecture:
MD5 checksum: e73a5a6cd23ef8a9d6e35ada4b809515
Sun Sparc architecture:
MD5 checksum: 98352a16b4dae2724f89e689c4d25d0e
Alpha architecture:
MD5 ch...