[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] Current versions of lpr fixes security problem



We have received reports that buffer overflows in lprm may allow users
to gain root access to the local system.  We recommend that you use
the binaries from hamm or any newer release.

dpkg -i file.deb
        will install the referred file.

Debian GNU/Linux 2.0 alias hamm
-------------------------------

  Source archives:
    ftp://ftp.debian.org/debian/hamm/hamm/source/net/lpr_5.9-29.diff.gz
      MD5 checksum: c87354b7ae2d2378c21ded59669b0233
    ftp://ftp.debian.org/debian/hamm/hamm/source/net/lpr_5.9-29.dsc
      MD5 checksum: 81bf5193c72468c52bb4ad979aa1cc0d
    ftp://ftp.debian.org/debian/hamm/hamm/source/net/lpr_5.9.orig.tar.gz
      MD5 checksum: 30a796a5a71030bf080b939b35497894

  Intel architecture:
    ftp://ftp.debian.org/debian/hamm/hamm/binary-i386/net/lpr_5.9-29.deb
      MD5 checksum: 392214b6ac654dee8798223412716723

  Motorola 68xxx architecture:
    ftp://ftp.debian.org/debian/hamm/hamm/binary-m68k/net/lpr_5.9-29.deb
      MD5 checksum: 6cd4d38288d8d8253fee282d6447c96d


--
Debian GNU/Linux    .    Security Managers    .    security@debian.org

Christian Hudon <chrish@debian.org> . Martin Schulze <joey@debian.org>

Attachment: pgpFmDpL9atzj.pgp
Description: PGP signature


Reply to: