[<prev] [next>] [day] [month] [year] [list]
Message-id: <E1Irh9u-0002AW-6E@artemis.annvix.ca>
Date: Mon, 12 Nov 2007 14:49:30 -0700
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDKSA-2007:204-1 ] - Updated cups packages fix
vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2007:204-1
http://www.mandriva.com/security/
_______________________________________________________________________
Package : cups
Date : November 12, 2007
Affected: 2008.0
_______________________________________________________________________
Problem Description:
Alin Rad Pop of Secunia Research discovered a vulnerability in CUPS
that can be exploited by malicious individuals to execute arbitrary
code. This flaw is due to a boundary error when processing IPP
(Internet Printing Protocol) tags.
Update:
Due to incorrect build requirements/conflicts, the cups-config
in Mandriva Linux 2008.0 was displaying the full CFLAGS and libs
instead of just the libraries when 'cups-config --libs' was invoked.
This update corrects the cups-config behaviour.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4351
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2008.0:
066d0553d0d41408d9f0b0d89b9299de 2008.0/i586/cups-1.3.0-3.2mdv2008.0.i586.rpm
761125ca708cd22b2360e84f36674051 2008.0/i586/cups-common-1.3.0-3.2mdv2008.0.i586.rpm
24a6797ad61c1ee82710480cba57c912 2008.0/i586/cups-serial-1.3.0-3.2mdv2008.0.i586.rpm
2c6d558345461a1813ea8ffa9b93be4e 2008.0/i586/libcups2-1.3.0-3.2mdv2008.0.i586.rpm
30bd123775b39ffd80e94d3232dbd5ce 2008.0/i586/libcups2-devel-1.3.0-3.2mdv2008.0.i586.rpm
1d147d09513abcb5e556a02dcb4272aa 2008.0/i586/php-cups-1.3.0-3.2mdv2008.0.i586.rpm
cfcb64cb2bc0af7b05c3770138a9311c 2008.0/SRPMS/cups-1.3.0-3.2mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
617534198402457ccce075bfc8341a2d 2008.0/x86_64/cups-1.3.0-3.2mdv2008.0.x86_64.rpm
d7f56b65a853c2030ee85a5b9db1b800 2008.0/x86_64/cups-common-1.3.0-3.2mdv2008.0.x86_64.rpm
48c4cd42cd19179ffeb003e1fed91f62 2008.0/x86_64/cups-serial-1.3.0-3.2mdv2008.0.x86_64.rpm
2760af902f9937b89dfb836a07b373b2 2008.0/x86_64/lib64cups2-1.3.0-3.2mdv2008.0.x86_64.rpm
a9cb35f7fa4cf7b55ef5730690b04aff 2008.0/x86_64/lib64cups2-devel-1.3.0-3.2mdv2008.0.x86_64.rpm
7de4fe03981dbf79b9324e6e3fe244e4 2008.0/x86_64/php-cups-1.3.0-3.2mdv2008.0.x86_64.rpm
cfcb64cb2bc0af7b05c3770138a9311c 2008.0/SRPMS/cups-1.3.0-3.2mdv2008.0.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFHOKAumqjQ0CJFipgRAgfXAKCXXTmPhErJH4yPYSvJGYaC1ESFqACfUhpO
49ACWgewrpwKsu3pjlqBwbo=
=RPar
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists