[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[debian-users:36567] Forward: [SECURITY] [DSA 267-1] New lpr packages fix local root exploit



ã“ã®DSAã¯potatoã«ã‚‚é©ç”¨ã•ã‚Œã¾ã™ã€‚

ç¾åœ¨ã® Debian 安定版 (3.0 woody) ã«ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ã«é–¢ã™ã‚‹æ·±åˆ»ãªå•é¡ŒãŒç™ºè¦‹
ã•ã‚Œã¾ã—ãŸã€‚

対象パッケージ: lpr

対処済ã¿ã®ãƒ‘ッケージã«æ›´æ–°ã™ã‚‹ã«ã¯ã€

deb http://security.debian.org/ stable/updates main contrib non-free

ã‚’ /etc/apt/sources.list ã«è¿½åŠ ã—ã€

apt-get update ; apt-get upgrade

を実行ã—ã¦ãã ã•ã„。

詳細ã«ã¤ã„ã¦ã¯æ·»ä»˜ã®ã‚¢ãƒŠã‚¦ãƒ³ã‚¹ã‚’ã”覧ãã ã•ã„。

--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 267-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
March 24th, 2003                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : lpr
Vulnerability  : buffer overflow
Problem-Type   : local
Debian-specific: no
CVE Id         : CAN-2003-0144

A buffer overflow has been discovered in lpr, a BSD lpr/lpd line
printer spooling system.  This problem can be exploited by a local
user to gain root privileges, even if the printer system is set up
properly.

For the stable distribution (woody) this problem has been fixed in
version 2000.05.07-4.3.

For the old stable distribution (potato) this problem has been fixed
in version 0.48-1.1.

For the stable distribution (sid) this problem has been fixed in
version 2000.05.07-4.20.

We recommend that you upgrade your lpr package immediately.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1.dsc
      Size/MD5 checksum:      533 2eb50aa0c9f2292f2977d0029bd3fdd3
    http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1.diff.gz
      Size/MD5 checksum:     8800 709256e0ad0a7f664aba6e0c2ddaf231
    http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48.orig.tar.gz
      Size/MD5 checksum:    75943 7b67555568e1c2d03aedbe66098a52a5

  Alpha architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1_alpha.deb
      Size/MD5 checksum:   112682 1ea3231bfa2024cb1d7d9fd8c94aa091

  ARM architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1_arm.deb
      Size/MD5 checksum:    89128 d185b06412be87a1966ac25cda23dea1

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1_i386.deb
      Size/MD5 checksum:    85960 1758a9683ae487c20f46a73ba32d9c15

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1_m68k.deb
      Size/MD5 checksum:    81900 f64919ec85dd3bdc27d6f7de192fafc5

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1_powerpc.deb
      Size/MD5 checksum:    91200 3b790c8221b61cf7aaff0bcb90fe00de

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1_sparc.deb
      Size/MD5 checksum:    97776 954f64d74744f3c37fecbb4a78ffbe14


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3.dsc
      Size/MD5 checksum:      559 8daab94fdff4f6e286224956eaecf054
    http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3.diff.gz
      Size/MD5 checksum:    24745 8e7a035f2392a1e4a43ab3eef20a596d
    http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07.orig.tar.gz
      Size/MD5 checksum:    71600 d0e726f0fea4324c9b63db50bbfd778e

  Alpha architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_alpha.deb
      Size/MD5 checksum:   129660 94f6b0b445c3b89ce76f2e2d3fa54c6e

  ARM architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_arm.deb
      Size/MD5 checksum:    95384 31e43ac786a3731b7d19eee00b757adc

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_i386.deb
      Size/MD5 checksum:    93136 4d81cb964fb6bdcf732bbedcbf06ce45

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_ia64.deb
      Size/MD5 checksum:   158734 a58ce7dd66d423dbf26e3eb9e16dd5d4

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_hppa.deb
      Size/MD5 checksum:   108290 1cabcb262997bdc0bea262b9a54c1392

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_m68k.deb
      Size/MD5 checksum:    90322 aacd62143f4736ed6ac5d80f0399bb1c

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_mips.deb
      Size/MD5 checksum:   111904 2af9c7b4e0754ebf7e175e59a2a20574

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_mipsel.deb
      Size/MD5 checksum:   111708 7fb650fb9c86835f68b774054f80434f

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_powerpc.deb
      Size/MD5 checksum:    97256 a0a12802e5ec7a021f2d9cb932ca7191

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_s390.deb
      Size/MD5 checksum:    97214 08606777eeb7d98a11835030fe2298a6

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_sparc.deb
      Size/MD5 checksum:   122218 2f870ec489eacb68628d9522a68ceb77


  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+fydPW5ql+IAeqTIRAsq8AJ9lcukdJP6fDQxMzFHXqaJguhg5YACgrY9X
kiZQ4sVtl4Swhj54z2AzmJg=
=3XBp
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

--- End Message ---