-----BEGIN PGP SIGNED MESSAGE-----

We have received reports that the lsof package is distributed in
Debian GNU/Linux 2.0 contains a buffer overflow. Using this overflow
it is possible for local users to gain root-access. We have fixed
this problem in version 4.37-3.

We recommend you upgrade your lsof package immediately.

wget url
	will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

Debian GNU/Linux 2.0 alias hamm
- -------------------------------

  This version of Debian was released only for the Intel and the
  Motorola 68xxx architecture.


  Source archives:
          MD5 checksum: d85b3e241693c64c64a523dbc36227ef
          MD5 checksum: 55472cf9e28bddc396ddda653b064a29
          MD5 checksum: af883ff0eb3b1c0f0134a79f18158257

  Intel architecture:
          MD5 checksum: e91000cbaaf9661a1fbb1a268fb5cf7b

  Motorola 680x0 architecture:
          MD5 checksum: 09aa6eccd186a12aeb152f265e37c8b2


  These files will be moved into
   soon.


For not yet released architectures please refer to the appropriate
directory  .

- -- 
Debian GNU/Linux      .    Security Managers     .   security@debian.org
              debian-security-announce@lists.debian.org
  Christian Hudon     .     Wichert Akkerman     .     Martin Schulze
   .     .   


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBNtcR4ajZR/ntlUftAQFVBgMAg0A/HjleQ3ljBjggOVQ4VEGvkV8WP6Y6
/N9Jak7HP2Wy8hG7W/Wq5cZ0+JWwLPNDv6MbPItCCuIrC8803hm5ie6hpiAo8fiS
o/xS6VcJTeBGxF/2UXz7vvS7AA/FuaNc
=g5Hf
-----END PGP SIGNATURE-----

New version of lsof fixes buffer overflow

December 13, 1999
We have received reports that the lsof package is distributed in Debian GNU/Linux 2.0 contains a buffer overflow

Summary

We recommend you upgrade your lsof package immediately.

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

Debian GNU/Linux 2.0 alias hamm

This version of Debian was released only for the Intel and the
Motorola 68xxx architecture.


Source archives:
MD5 checksum: d85b3e241693c64c64a523dbc36227ef
MD5 checksum: 55472cf9e28bddc396ddda653b064a29
MD5 checksum: af883ff0eb3b1c0f0134a79f18158257

Intel architecture:
MD5 checksum: e91000cbaaf9661a1fbb1a268fb5cf7b

Motorola 680x0 architecture:
MD5 checksum: 09aa6eccd186a12aeb152f265e37c8b2


These files will be moved into
soon.


For not yet released architectures please refer to the appropriate
directory .

- --
Debian GNU/Linux . Security Managers . security@debian.org
debian-security-announce@lists.debian.org
Christian Hudon . Wichert Akkerman . Martin Schulze
. .


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBNtcR4ajZR/ntlUftAQFVBgMAg0A/HjleQ3ljBjggOVQ4VEGvkV8WP6Y6
/N9Jak7HP2Wy8hG7W/Wq5cZ0+JWwLPNDv6MbPItCCuIrC8803hm5ie6hpiAo8fiS
o/xS6VcJTeBGxF/2UXz7vvS7AA/FuaNc
=g5Hf
-----END PGP SIGNATURE-----



Severity
We have received reports that the lsof package is distributed in
Debian GNU/Linux 2.0 contains a buffer overflow. Using this overflow
it is possible for local users to gain root-access. We have fixed
this problem in version 4.37-3.

Related News