Debian: lpr buffer overflow vulnerability DSA-267-1
Summary
A buffer overflow has been discovered in lpr, a BSD lpr/lpd line
printer spooling system. This problem can be exploited by a local
user to gain root privileges, even if the printer system is set up
properly.
For the stable distribution (woody) this problem has been fixed in
version 2000.05.07-4.3.
For the old stable distribution (potato) this problem has been fixed
in version 0.48-1.1.
For the stable distribution (sid) this problem has been fixed in
version 2000.05.07-4.20.
We recommend that you upgrade your lpr package immediately.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
Source archives:
Size/MD5 checksum: 533 2eb50aa0c9f2292f2977d0029bd3fdd3
Size/MD5 checksum: 8800 709256e0ad0a7f664aba6e0c2ddaf231
Size/MD5 checksum: 75943 7b67555568e1c2d03aedbe66098a52a5
Alpha architecture:
Size/MD5 checksum: 112682 1ea3231bfa2024cb1d7d9fd8c94aa091
ARM architecture:
Size/MD5 checksum: 89128 d185b06412be87a1966ac25cda23dea1
Intel IA-32 architecture:
Size/MD5 checksum: 85960 1758a9683ae487c20f46a73ba32d9c15
Motorola 680x0 architecture:
Size/MD5 checksum: 81900 f64919ec85dd3bdc27d6f7de192fafc5
PowerPC architecture:
Size/MD5 checksum: 91200 3b790c8221b61cf7aaff0bcb90fe00de
Sun Sparc architecture:
Size/MD5 checksum: 97776 954f64d74744f3c37fecbb4a78ffbe14
Debian GNU/Linux 3.0 alias woody
Source archives:
Size/MD5 checksum: 559 8daab94fdff4f6e286224956eaecf054
Size/MD5 checksum: 24745 8e7a035f2392a1e4a43ab3eef20a596d
Size/MD5 checksum: 71600 d0e726f0fea4324c9b63db50bbfd778e
Alpha architecture:
Size/MD5 checksum: 129660 94f6b0b445c3b89ce76f2e2d3fa54c6e
ARM architecture:
Size/MD5 checksum: 95384 31e43ac786a3731b7d19eee00b757adc
Intel IA-32 architecture:
Size/MD5 checksum: 93136 4d81cb964fb6bdcf732bbedcbf06ce45
Intel IA-64 architecture:
Size/MD5 checksum: 158734 a58ce7dd66d423dbf26e3eb9e16dd5d4
HP Precision architecture:
Size/MD5 checksum: 108290 1cabcb262997bdc0bea262b9a54c1392
Motorola 680x0 architecture:
Size/MD5 checksum: 90322 aacd62143f4736ed6ac5d80f0399bb1c
Big endian MIPS architecture:
Size/MD5 checksum: 111904 2af9c7b4e0754ebf7e175e59a2a20574
Little endian MIPS architecture:
Size/MD5 checksum: 111708 7fb650fb9c86835f68b774054f80434f
PowerPC architecture:
Size/MD5 checksum: 97256 a0a12802e5ec7a021f2d9cb932ca7191
IBM S/390 architecture:
Size/MD5 checksum: 97214 08606777eeb7d98a11835030fe2298a6
Sun Sparc architecture:
Size/MD5 checksum: 122218 2f870ec489eacb68628d9522a68ceb77
These files will probably be moved into the stable distribution on
its next revision.
For apt-get: deb Debian -- Security Information stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show