lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 12 Nov 2007 14:49:30 -0700
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2007:204-1 ] - Updated cups packages fix vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                       MDKSA-2007:204-1
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : cups
 Date    : November 12, 2007
 Affected: 2008.0
 _______________________________________________________________________
 
 Problem Description:
 
 Alin Rad Pop of Secunia Research discovered a vulnerability in CUPS
 that can be exploited by malicious individuals to execute arbitrary
 code.  This flaw is due to a boundary error when processing IPP
 (Internet Printing Protocol) tags.

 Update:

 Due to incorrect build requirements/conflicts, the cups-config
 in Mandriva Linux 2008.0 was displaying the full CFLAGS and libs
 instead of just the libraries when 'cups-config --libs' was invoked.
 This update corrects the cups-config behaviour.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4351
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2008.0:
 066d0553d0d41408d9f0b0d89b9299de  2008.0/i586/cups-1.3.0-3.2mdv2008.0.i586.rpm
 761125ca708cd22b2360e84f36674051  2008.0/i586/cups-common-1.3.0-3.2mdv2008.0.i586.rpm
 24a6797ad61c1ee82710480cba57c912  2008.0/i586/cups-serial-1.3.0-3.2mdv2008.0.i586.rpm
 2c6d558345461a1813ea8ffa9b93be4e  2008.0/i586/libcups2-1.3.0-3.2mdv2008.0.i586.rpm
 30bd123775b39ffd80e94d3232dbd5ce  2008.0/i586/libcups2-devel-1.3.0-3.2mdv2008.0.i586.rpm
 1d147d09513abcb5e556a02dcb4272aa  2008.0/i586/php-cups-1.3.0-3.2mdv2008.0.i586.rpm 
 cfcb64cb2bc0af7b05c3770138a9311c  2008.0/SRPMS/cups-1.3.0-3.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 617534198402457ccce075bfc8341a2d  2008.0/x86_64/cups-1.3.0-3.2mdv2008.0.x86_64.rpm
 d7f56b65a853c2030ee85a5b9db1b800  2008.0/x86_64/cups-common-1.3.0-3.2mdv2008.0.x86_64.rpm
 48c4cd42cd19179ffeb003e1fed91f62  2008.0/x86_64/cups-serial-1.3.0-3.2mdv2008.0.x86_64.rpm
 2760af902f9937b89dfb836a07b373b2  2008.0/x86_64/lib64cups2-1.3.0-3.2mdv2008.0.x86_64.rpm
 a9cb35f7fa4cf7b55ef5730690b04aff  2008.0/x86_64/lib64cups2-devel-1.3.0-3.2mdv2008.0.x86_64.rpm
 7de4fe03981dbf79b9324e6e3fe244e4  2008.0/x86_64/php-cups-1.3.0-3.2mdv2008.0.x86_64.rpm 
 cfcb64cb2bc0af7b05c3770138a9311c  2008.0/SRPMS/cups-1.3.0-3.2mdv2008.0.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFHOKAumqjQ0CJFipgRAgfXAKCXXTmPhErJH4yPYSvJGYaC1ESFqACfUhpO
49ACWgewrpwKsu3pjlqBwbo=
=RPar
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ