|
|
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] cups (SSA:2009-116-01)
Date: Sun, 26 Apr 2009 15:50:34 -0700 (PDT) |
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] cups (SSA:2009-116-01)
New cups packages are available for Slackware 12.0, 12.1, 12.2, and -current to
fix security issues.
More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0164
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166
Here are the details from the Slackware 12.2 ChangeLog:
+--------------------------+
patches/packages/cups-1.3.10-i486-1_slack12.2.tgz:
Upgraded to cups-1.3.10.
This fixes several security issues, including an integer overflow in the TIFF
decoder, a failure to properly verify the Host HTTP header, and several
problems with PDF handling (the new CUPS uses a wrapper rather than embedded
code taken from xpdf). These issues could result in a denial of service or
the execution of arbitrary code.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0164
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
directly from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 12.0:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/cups-1.3.10-i486-1_slack12.0.tgz
Updated package for Slackware 12.1:
ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/cups-1.3.10-i486-1_slack12.1.tgz
Updated package for Slackware 12.2:
ftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/cups-1.3.10-i486-1_slack12.2.tgz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/cups-1.3.10-i486-1.tgz
MD5 signatures:
+-------------+
Slackware 12.0 package:
dbf34b8eb6f942ae8cb14ab43e5d3abf cups-1.3.10-i486-1_slack12.0.tgz
Slackware 12.1 package:
96e3963385de424bd0455760ecf70944 cups-1.3.10-i486-1_slack12.1.tgz
Slackware 12.2 package:
ccb8896aeb41dd321af8318e51e9f8d2 cups-1.3.10-i486-1_slack12.2.tgz
Slackware -current package:
f7bd3fa36e2c2741ad029ed07fa4425b cups-1.3.10-i486-1.tgz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg cups-1.3.10-i486-1_slack12.2.tgz
If the machine is running the CUPS server, restart it:
# sh /etc/rc.d/rc.cups restart
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkn037kACgkQakRjwEAQIjP6jwCff4E6SNK6lw5puZGSgwo7PDLg
MkQAnRUHz3mI3RQDlC0/nbWeN/Ve8Shg
=JZeT
-----END PGP SIGNATURE-----
|
| |