[Previo por Fecha] [Siguiente por Fecha] [Previo por Hilo] [Siguiente por Hilo]

[Hilos de Discusión] [Fecha] [Tema] [Autor]

[ewt en redhat com: SECURITY: lpr-0.31 now available]



------- Start of forwarded message -------
Return-Path: <redhat-announce-list-request en redhat com>
Resent-Cc: recipient list not shown: ;
MBOX-Line: From redhat-announce-list-request en redhat com  Thu Apr 23 11:40:41 1998
X-Authentication-Warning: mercury.redhat.com: ewt owned process doing -bs
Date: Thu, 23 Apr 1998 11:41:14 -0400 (EDT)
From: Erik Troan <ewt en redhat com>
Reply-To: redhat-list en redhat com
To: redhat-announce-list en redhat com
Subject: SECURITY: lpr-0.31 now available
Approved: ewt en redhat com
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Resent-From: redhat-announce-list en redhat com
X-Mailing-List: <redhat-announce-list en redhat com> archive/latest/33
X-Loop: redhat-announce-list en redhat com
Precedence: list
Resent-Sender: redhat-announce-list-request en redhat com
X-URL: http://www.redhat.com


More buffer overflows have been found in lpr 0.30 as released on 
Saturday. As these flaws may allow users to gain root access to the
local system, Red Hat Software recommends that all users upgrade to
lpr 0.31 immediately.

Thanks to Niall Smart for finding this problem.

Red Hat 5.0
- -------------

i386:
rpm -Uvh ftp://ftp.redhat.com/updates/5.0/i386/lpr-0.31-1.i386.rpm

alpha:
rpm -Uvh ftp://ftp.redhat.com/updates/5.0/alpha/lpr-0.31-1.alpha.rpm

Red Hat 4.2
- -------------

i386:
rpm -Uvh ftp://ftp.redhat.com/updates/4.2/i386/lpr-0.31-0.i386.rpm

alpha:
rpm -Uvh ftp://ftp.redhat.com/updates/4.2/alpha/lpr-0.31-0.alpha.rpm

SPARC:
rpm -Uvh ftp://ftp.redhat.com/updates/4.2/sparc/lpr-0.31-0.sparc.rpm



- -- 
To unsubscribe:
mail -s unsubscribe redhat-announce-list-request en redhat com < /dev/null
------- End of forwarded message -------



[Hilos de Discusión] [Fecha] [Tema] [Autor]