[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHBA-2003:276-01] Updated printer configuration tool fixes SMB problems

Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Bug Fix Advisory

Synopsis:          Updated printer configuration tool fixes SMB problems
Advisory ID:       RHBA-2003:276-01
Issue date:        2003-09-17
Updated on:        2003-09-17
Product:           Red Hat Linux
Cross references:  
Obsoletes:         RHBA-2003:125
- ---------------------------------------------------------------------

1. Topic:

New redhat-config-printer packages are now available that fix assorted bugs,
including one that affects printing to a remote queue provided by an SMB
(CIFS) share.

2. Relevant releases/architectures:

Red Hat Linux 9 - i386

3. Problem description:

The redhat-config-printer packages contain graphical and text-based printer
configuration tools.

The following bugs have been found in these tools:

- - A problem with the 'browsed queues' feature of the graphical
configuration tool has been addressed.

- - Other fixes in this release involve the strict RFC 1179 compliance
setting, serial printers connected to ports on multi-port serial cards
(i.e. not onboard ports), some queue configurations not being upgraded
correctly, and SMB printing.

- - Printing directed to an SMB share is controlled by the smbspool program,
which expects a device URI in one of several forms. Some of these URI forms
were being assembled incorrectly by the Red Hat printer configuration tool,
and so smbspool could not act upon them. Consequently, although a queue for
an SMB share looked correctly configured, printing to it failed to generate
print output.

- - Attempting to select an alternate driver that was first in the list of
available drivers sometimes failed.

Additionally, PTAL (Peripheral Transport Abstraction Library) support has
been added, supporting devices accessible via the hpoj package.

Red Hat recommends that affected users install the packages contained in
this erratum, which resolve these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:


This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL Certificate 
Errors, you need to install a version of the up2date client with an updated 
certificate.  The latest version of up2date is available from the Red Hat 
FTP site and may also be downloaded directly from the RHN website:


5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

80717 - Printing to smb share hangs
104136 - SAMBA client working, printer configuration not working
104293 - r-c-printer doesn't generate correct URI's for SMB printers
104380 - Can't change driver for queue.

6. RPMs required:

Red Hat Linux 9:



7. Verification:

MD5 sum                          Package Name
- --------------------------------------------------------------------------
5acb778db3f5958068941f4a4c3a77b5 9/en/os/SRPMS/redhat-config-printer-
3c5017cc0fe883bdc7786274fceb6ba4 9/en/os/i386/redhat-config-printer-
4623dd7eae5187f6c6e15a0ff9488c73 9/en/os/i386/redhat-config-printer-gui-

These packages are GPG signed by Red Hat for security.  Our key is
available from https://www.redhat.com/security/keys.html

You can verify each package with the following command:
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    md5sum <filename>

8. Contact:

The Red Hat security contact is <secalert redhat com>.  More contact
details at https://www.redhat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.
Version: GnuPG v1.0.7 (GNU/Linux)


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]