[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <E1KTUfs-0001TW-Kc@titan.mandriva.com>
Date: Wed, 13 Aug 2008 22:43:00 -0600
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2008:170 ] cups
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2008:170
http://www.mandriva.com/security/
_______________________________________________________________________
Package : cups
Date : August 13, 2008
Affected: 2007.1, 2008.0, 2008.1, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________
Problem Description:
Thomas Pollet discovered an integer overflow vulnerability in the PNG
image handling filter in CUPS. This could allow a malicious user to
execute arbitrary code with the privileges of the user running CUPS,
or cause a denial of service by sending a specially crafted PNG image
to the print server (CVE-2008-1722).
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1722
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.1:
e6e836d1d60b2fa4e89626ca342718da 2007.1/i586/cups-1.2.10-2.7mdv2007.1.i586.rpm
23bbf517fb49c494c964f2fd0c7e486f 2007.1/i586/cups-common-1.2.10-2.7mdv2007.1.i586.rpm
0dcf242590878f1bcc19a9a67f2bf6f8 2007.1/i586/cups-serial-1.2.10-2.7mdv2007.1.i586.rpm
b13c0e72bbbc55e9fc5d1d2fa233c815 2007.1/i586/libcups2-1.2.10-2.7mdv2007.1.i586.rpm
43ae6ae77fe663392eab35dd6e86dcf9 2007.1/i586/libcups2-devel-1.2.10-2.7mdv2007.1.i586.rpm
c485c64d51554dcae1636bae567d52bb 2007.1/i586/php-cups-1.2.10-2.7mdv2007.1.i586.rpm
02cf79142cb3188f74ac7b23826531ec 2007.1/SRPMS/cups-1.2.10-2.7mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64:
8704d20431f56cdfbfa2a81ff0c9716b 2007.1/x86_64/cups-1.2.10-2.7mdv2007.1.x86_64.rpm
e347090c027bfceb5d36077750bbde52 2007.1/x86_64/cups-common-1.2.10-2.7mdv2007.1.x86_64.rpm
03a84b9825640e559c2f22c0d498324d 2007.1/x86_64/cups-serial-1.2.10-2.7mdv2007.1.x86_64.rpm
8992cab63c56d088ac5e7f6e47c1380f 2007.1/x86_64/lib64cups2-1.2.10-2.7mdv2007.1.x86_64.rpm
3dfee471c6ab99379610af928d074063 2007.1/x86_64/lib64cups2-devel-1.2.10-2.7mdv2007.1.x86_64.rpm
d1803179503ff874539580d027d50f0e 2007.1/x86_64/php-cups-1.2.10-2.7mdv2007.1.x86_64.rpm
02cf79142cb3188f74ac7b23826531ec 2007.1/SRPMS/cups-1.2.10-2.7mdv2007.1.src.rpm
Mandriva Linux 2008.0:
ad1944423890980426468c9d2cc35292 2008.0/i586/cups-1.3.6-1.2mdv2008.0.i586.rpm
e2da311a716df6075450e3fc700f8fa0 2008.0/i586/cups-common-1.3.6-1.2mdv2008.0.i586.rpm
26952cab7a9352b7ee261e324cb2a864 2008.0/i586/cups-serial-1.3.6-1.2mdv2008.0.i586.rpm
596464ca36baba5e1ea8a3b82c0b5aca 2008.0/i586/libcups2-1.3.6-1.2mdv2008.0.i586.rpm
38628e8316b29e266bbfce642ff40ed4 2008.0/i586/libcups2-devel-1.3.6-1.2mdv2008.0.i586.rpm
16a7a67f6ea9d0533500a02f5fc2197d 2008.0/i586/php-cups-1.3.6-1.2mdv2008.0.i586.rpm
cf55fd60312efe614352598a124ad721 2008.0/SRPMS/cups-1.3.6-1.2mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
bc0185dc8eb598431661de50b6b67538 2008.0/x86_64/cups-1.3.6-1.2mdv2008.0.x86_64.rpm
07bc12fc705e94ba554b915b48778726 2008.0/x86_64/cups-common-1.3.6-1.2mdv2008.0.x86_64.rpm
bb085c47b0c75e6244d25c3ac6575013 2008.0/x86_64/cups-serial-1.3.6-1.2mdv2008.0.x86_64.rpm
7cae6612c1bcc43b0d8ecc14dd24b2b7 2008.0/x86_64/lib64cups2-1.3.6-1.2mdv2008.0.x86_64.rpm
b3566be34e2041b40f7ed6be97cec831 2008.0/x86_64/lib64cups2-devel-1.3.6-1.2mdv2008.0.x86_64.rpm
02195805095b57b48f41f82ae25ba35e 2008.0/x86_64/php-cups-1.3.6-1.2mdv2008.0.x86_64.rpm
cf55fd60312efe614352598a124ad721 2008.0/SRPMS/cups-1.3.6-1.2mdv2008.0.src.rpm
Mandriva Linux 2008.1:
cead86dad7a602167161f8e62fd6c43c 2008.1/i586/cups-1.3.6-5.1mdv2008.1.i586.rpm
2c3a0be519d0f027ef9ad58a0502ea06 2008.1/i586/cups-common-1.3.6-5.1mdv2008.1.i586.rpm
40a13e5f2d2d7b557cc3cd18a271444a 2008.1/i586/cups-serial-1.3.6-5.1mdv2008.1.i586.rpm
f7ac7c6daa9e94d7be7215d20b5a9dd8 2008.1/i586/libcups2-1.3.6-5.1mdv2008.1.i586.rpm
4e684a41c2174acc19a3ca26917503a5 2008.1/i586/libcups2-devel-1.3.6-5.1mdv2008.1.i586.rpm
cd62b541b3a8ff5076081aaa98dcd186 2008.1/i586/php-cups-1.3.6-5.1mdv2008.1.i586.rpm
2eed67e578b217fe60b9b88dd8f67efe 2008.1/SRPMS/cups-1.3.6-5.1mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64:
6260df80fd2ed6a506cda8b8e08a8965 2008.1/x86_64/cups-1.3.6-5.1mdv2008.1.x86_64.rpm
4d4f83b7b4c345ed09bcf7a30bcf563c 2008.1/x86_64/cups-common-1.3.6-5.1mdv2008.1.x86_64.rpm
ff623fb9ade013d2e9162171cda2987b 2008.1/x86_64/cups-serial-1.3.6-5.1mdv2008.1.x86_64.rpm
452d007674d0bf192a1b1e142b5b8425 2008.1/x86_64/lib64cups2-1.3.6-5.1mdv2008.1.x86_64.rpm
ec07d9fdf765dbccea3a85d65301b12f 2008.1/x86_64/lib64cups2-devel-1.3.6-5.1mdv2008.1.x86_64.rpm
3dc1a8a3673ed4c98b706067eea40b1d 2008.1/x86_64/php-cups-1.3.6-5.1mdv2008.1.x86_64.rpm
2eed67e578b217fe60b9b88dd8f67efe 2008.1/SRPMS/cups-1.3.6-5.1mdv2008.1.src.rpm
Corporate 3.0:
0c84961ab135d0c81a59983b423e6f38 corporate/3.0/i586/cups-1.1.20-5.18.C30mdk.i586.rpm
33e08698de8935b7b3bb627693e3977e corporate/3.0/i586/cups-common-1.1.20-5.18.C30mdk.i586.rpm
45a222373a898a51475335072a37398e corporate/3.0/i586/cups-serial-1.1.20-5.18.C30mdk.i586.rpm
5c5f642a54212359ea0fe8bc8f48820f corporate/3.0/i586/libcups2-1.1.20-5.18.C30mdk.i586.rpm
808274f44ab2b83782d86aa500f1af68 corporate/3.0/i586/libcups2-devel-1.1.20-5.18.C30mdk.i586.rpm
ff5c02e7f7db059ac70e3ca452888d28 corporate/3.0/SRPMS/cups-1.1.20-5.18.C30mdk.src.rpm
Corporate 3.0/X86_64:
63551ab65fc917f0ea559087868fe913 corporate/3.0/x86_64/cups-1.1.20-5.18.C30mdk.x86_64.rpm
9df06fb96d03ceafeccb24e542ad0d89 corporate/3.0/x86_64/cups-common-1.1.20-5.18.C30mdk.x86_64.rpm
05e18474c9421cd3e7c6e56bc6429c7a corporate/3.0/x86_64/cups-serial-1.1.20-5.18.C30mdk.x86_64.rpm
37836aa82b213bd6b1354acd78361cef corporate/3.0/x86_64/lib64cups2-1.1.20-5.18.C30mdk.x86_64.rpm
a8ba97db51bda184b146fa0e29a31cc5 corporate/3.0/x86_64/lib64cups2-devel-1.1.20-5.18.C30mdk.x86_64.rpm
ff5c02e7f7db059ac70e3ca452888d28 corporate/3.0/SRPMS/cups-1.1.20-5.18.C30mdk.src.rpm
Corporate 4.0:
039665809c005439fb99e971b676f535 corporate/4.0/i586/cups-1.2.4-0.9.20060mlcs4.i586.rpm
bce68ebe471af117fa0dd2033f6f18ea corporate/4.0/i586/cups-common-1.2.4-0.9.20060mlcs4.i586.rpm
434e0523b009d495b074e4efd595f36f corporate/4.0/i586/cups-serial-1.2.4-0.9.20060mlcs4.i586.rpm
3988cb0f999fb944ca315c80ecbac584 corporate/4.0/i586/libcups2-1.2.4-0.9.20060mlcs4.i586.rpm
8e805b458bb1b3d7539b1be47245b87c corporate/4.0/i586/libcups2-devel-1.2.4-0.9.20060mlcs4.i586.rpm
53cf97e5264d4e4e553ca58786b83f99 corporate/4.0/i586/php-cups-1.2.4-0.9.20060mlcs4.i586.rpm
4d3500f0c88fd849eed34e07325132ce corporate/4.0/SRPMS/cups-1.2.4-0.9.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
b42cb1248dcb970ed386feb61e0053fd corporate/4.0/x86_64/cups-1.2.4-0.9.20060mlcs4.x86_64.rpm
23eaf7aff2f39c1f04007e10ebba98d0 corporate/4.0/x86_64/cups-common-1.2.4-0.9.20060mlcs4.x86_64.rpm
80f678e23d28a1e05c70a9e372538172 corporate/4.0/x86_64/cups-serial-1.2.4-0.9.20060mlcs4.x86_64.rpm
7394b5abd24c4e55ad9bcb906c8fe397 corporate/4.0/x86_64/lib64cups2-1.2.4-0.9.20060mlcs4.x86_64.rpm
dd46af363759816c8336d31c6da9c947 corporate/4.0/x86_64/lib64cups2-devel-1.2.4-0.9.20060mlcs4.x86_64.rpm
af0d19bf838e3f8d548ab669459c1506 corporate/4.0/x86_64/php-cups-1.2.4-0.9.20060mlcs4.x86_64.rpm
4d3500f0c88fd849eed34e07325132ce corporate/4.0/SRPMS/cups-1.2.4-0.9.20060mlcs4.src.rpm
Multi Network Firewall 2.0:
0aa4175864fda95cc92b056ee8186fec mnf/2.0/i586/libcups2-1.1.20-5.18.C30mdk.i586.rpm
28e071126d2fbb4afaa0e35299440843 mnf/2.0/SRPMS/cups-1.1.20-5.18.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFIo4jlmqjQ0CJFipgRAqHiAJ497++hlRzlTIWz1CKrGswLJ1TvNQCfemi8
ae/GaLEhDVGg1Bc6PHLtTYg=
=gLWC
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists