[Full-Disclosure] [SECURITY] [DSA 267-1] New lpr packages fix local root exploit

From: debian-security-announce@lists.debian.org
Date: 03/24/03

  • Next message: flur: "[Full-Disclosure] paFileDB 3.x SQL Injection Vulnerability"
    From: debian-security-announce@lists.debian.org
    To: full-disclosure@lists.netsys.com
    Date: Mon, 24 Mar 2003 16:42:07 +0100 (CET)
    

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 267-1 security@debian.org
    http://www.debian.org/security/ Martin Schulze
    March 24th, 2003 http://www.debian.org/security/faq
    - --------------------------------------------------------------------------

    Package : lpr
    Vulnerability : buffer overflow
    Problem-Type : local
    Debian-specific: no
    CVE Id : CAN-2003-0144

    A buffer overflow has been discovered in lpr, a BSD lpr/lpd line
    printer spooling system. This problem can be exploited by a local
    user to gain root privileges, even if the printer system is set up
    properly.

    For the stable distribution (woody) this problem has been fixed in
    version 2000.05.07-4.3.

    For the old stable distribution (potato) this problem has been fixed
    in version 0.48-1.1.

    For the stable distribution (sid) this problem has been fixed in
    version 2000.05.07-4.20.

    We recommend that you upgrade your lpr package immediately.

    Upgrade Instructions
    - --------------------

    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.

    If you are using the apt-get package manager, use the line for
    sources.list as given below:

    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages

    You may use an automated update by adding the resources from the
    footer to the proper configuration.

    Debian GNU/Linux 2.2 alias potato
    - ---------------------------------

      Source archives:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1.dsc
          Size/MD5 checksum: 533 2eb50aa0c9f2292f2977d0029bd3fdd3
        http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1.diff.gz
          Size/MD5 checksum: 8800 709256e0ad0a7f664aba6e0c2ddaf231
        http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48.orig.tar.gz
          Size/MD5 checksum: 75943 7b67555568e1c2d03aedbe66098a52a5

      Alpha architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1_alpha.deb
          Size/MD5 checksum: 112682 1ea3231bfa2024cb1d7d9fd8c94aa091

      ARM architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1_arm.deb
          Size/MD5 checksum: 89128 d185b06412be87a1966ac25cda23dea1

      Intel IA-32 architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1_i386.deb
          Size/MD5 checksum: 85960 1758a9683ae487c20f46a73ba32d9c15

      Motorola 680x0 architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1_m68k.deb
          Size/MD5 checksum: 81900 f64919ec85dd3bdc27d6f7de192fafc5

      PowerPC architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1_powerpc.deb
          Size/MD5 checksum: 91200 3b790c8221b61cf7aaff0bcb90fe00de

      Sun Sparc architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_0.48-1.1_sparc.deb
          Size/MD5 checksum: 97776 954f64d74744f3c37fecbb4a78ffbe14

    Debian GNU/Linux 3.0 alias woody
    - --------------------------------

      Source archives:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3.dsc
          Size/MD5 checksum: 559 8daab94fdff4f6e286224956eaecf054
        http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3.diff.gz
          Size/MD5 checksum: 24745 8e7a035f2392a1e4a43ab3eef20a596d
        http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07.orig.tar.gz
          Size/MD5 checksum: 71600 d0e726f0fea4324c9b63db50bbfd778e

      Alpha architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_alpha.deb
          Size/MD5 checksum: 129660 94f6b0b445c3b89ce76f2e2d3fa54c6e

      ARM architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_arm.deb
          Size/MD5 checksum: 95384 31e43ac786a3731b7d19eee00b757adc

      Intel IA-32 architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_i386.deb
          Size/MD5 checksum: 93136 4d81cb964fb6bdcf732bbedcbf06ce45

      Intel IA-64 architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_ia64.deb
          Size/MD5 checksum: 158734 a58ce7dd66d423dbf26e3eb9e16dd5d4

      HP Precision architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_hppa.deb
          Size/MD5 checksum: 108290 1cabcb262997bdc0bea262b9a54c1392

      Motorola 680x0 architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_m68k.deb
          Size/MD5 checksum: 90322 aacd62143f4736ed6ac5d80f0399bb1c

      Big endian MIPS architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_mips.deb
          Size/MD5 checksum: 111904 2af9c7b4e0754ebf7e175e59a2a20574

      Little endian MIPS architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_mipsel.deb
          Size/MD5 checksum: 111708 7fb650fb9c86835f68b774054f80434f

      PowerPC architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_powerpc.deb
          Size/MD5 checksum: 97256 a0a12802e5ec7a021f2d9cb932ca7191

      IBM S/390 architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_s390.deb
          Size/MD5 checksum: 97214 08606777eeb7d98a11835030fe2298a6

      Sun Sparc architecture:

        http://security.debian.org/pool/updates/main/l/lpr/lpr_2000.05.07-4.3_sparc.deb
          Size/MD5 checksum: 122218 2f870ec489eacb68628d9522a68ceb77

      These files will probably be moved into the stable distribution on
      its next revision.

    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: debian-security-announce@lists.debian.org
    Package info: `apt-cache show <pkg>' and http://packages.debian.org/>

    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.1 (GNU/Linux)

    iD8DBQE+fydPW5ql+IAeqTIRAsq8AJ9lcukdJP6fDQxMzFHXqaJguhg5YACgrY9X
    kiZQ4sVtl4Swhj54z2AzmJg=
    =3XBp
    -----END PGP SIGNATURE-----

    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter:
    http://lists.netsys.com/full-disclosure-charter.html


  • Next message: flur: "[Full-Disclosure] paFileDB 3.x SQL Injection Vulnerability"

    Relevant Pages