-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  hplip (SSA:2013-339-04)

New hplip packages are available for Slackware 14.0 to fix a security issue.


Here are the details from the Slackware 14.0 ChangeLog:
+--------------------------+
patches/packages/hplip-3.12.9-i486-4_slack14.0.txz:  Rebuilt.
  This update disables the automatic upgrade feature which can be easily
  fooled into downloading an arbitrary binary and executing it.  This
  issue affects only Slackware 14.0 (earlier versions do not have the
  feature, and newer ones had already disabled it).
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/hplip-3.12.9-i486-4_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/hplip-3.12.9-x86_64-4_slack14.0.txz


MD5 signatures:
+-------------+

Slackware 14.0 package:
6838bc89361bf4dd0011ad4d46b98bf0  hplip-3.12.9-i486-4_slack14.0.txz

Slackware x86_64 14.0 package:
a5193660b2318e29aa5586ead1feb126  hplip-3.12.9-x86_64-4_slack14.0.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg hplip-3.12.9-i486-4_slack14.0.txz


+-----+

Slackware: 2013-339-04: hplip Security Update

December 6, 2013
New hplip packages are available for Slackware 14.0 to fix a security issue

Summary

Here are the details from the Slackware 14.0 ChangeLog: patches/packages/hplip-3.12.9-i486-4_slack14.0.txz: Rebuilt. This update disables the automatic upgrade feature which can be easily fooled into downloading an arbitrary binary and executing it. This issue affects only Slackware 14.0 (earlier versions do not have the feature, and newer ones had already disabled it). For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427 (* Security fix *)

Where Find New Packages

Thanks to the friendly folks at the OSU Open Source Lab (https://osuosl.org/) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for additional mirror sites near you.
Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/hplip-3.12.9-i486-4_slack14.0.txz
Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/hplip-3.12.9-x86_64-4_slack14.0.txz

MD5 Signatures

Slackware 14.0 package: 6838bc89361bf4dd0011ad4d46b98bf0 hplip-3.12.9-i486-4_slack14.0.txz
Slackware x86_64 14.0 package: a5193660b2318e29aa5586ead1feb126 hplip-3.12.9-x86_64-4_slack14.0.txz

Severity
[slackware-security] hplip (SSA:2013-339-04)
New hplip packages are available for Slackware 14.0 to fix a security issue.

Installation Instructions

Installation instructions: Upgrade the package as root: # upgradepkg hplip-3.12.9-i486-4_slack14.0.txz

Related News