[Previo por Fecha] [Siguiente por Fecha] [Previo por Hilo] [Siguiente por Hilo]
[Hilos de Discusión] [Fecha] [Tema] [Autor]------- Start of forwarded message ------- Return-Path: <redhat-announce-list-request en redhat com> Resent-Cc: recipient list not shown: ; MBOX-Line: From redhat-announce-list-request en redhat com Thu Apr 23 11:40:41 1998 X-Authentication-Warning: mercury.redhat.com: ewt owned process doing -bs Date: Thu, 23 Apr 1998 11:41:14 -0400 (EDT) From: Erik Troan <ewt en redhat com> Reply-To: redhat-list en redhat com To: redhat-announce-list en redhat com Subject: SECURITY: lpr-0.31 now available Approved: ewt en redhat com MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Resent-From: redhat-announce-list en redhat com X-Mailing-List: <redhat-announce-list en redhat com> archive/latest/33 X-Loop: redhat-announce-list en redhat com Precedence: list Resent-Sender: redhat-announce-list-request en redhat com X-URL: http://www.redhat.com More buffer overflows have been found in lpr 0.30 as released on Saturday. As these flaws may allow users to gain root access to the local system, Red Hat Software recommends that all users upgrade to lpr 0.31 immediately. Thanks to Niall Smart for finding this problem. Red Hat 5.0 - ------------- i386: rpm -Uvh ftp://ftp.redhat.com/updates/5.0/i386/lpr-0.31-1.i386.rpm alpha: rpm -Uvh ftp://ftp.redhat.com/updates/5.0/alpha/lpr-0.31-1.alpha.rpm Red Hat 4.2 - ------------- i386: rpm -Uvh ftp://ftp.redhat.com/updates/4.2/i386/lpr-0.31-0.i386.rpm alpha: rpm -Uvh ftp://ftp.redhat.com/updates/4.2/alpha/lpr-0.31-0.alpha.rpm SPARC: rpm -Uvh ftp://ftp.redhat.com/updates/4.2/sparc/lpr-0.31-0.sparc.rpm - -- To unsubscribe: mail -s unsubscribe redhat-announce-list-request en redhat com < /dev/null ------- End of forwarded message -------