Login
Newsletter
Werbung

Sicherheit: Denial of Service in cups
Aktuelle Meldungen Distributionen
Name: Denial of Service in cups
ID: MDKSA-2007:086
Distribution: Mandriva
Plattformen: Mandriva Corporate 3.0, Mandriva Corporate 4.0, Mandriva 2007.0
Datum: Di, 17. April 2007, 00:40
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0720
Applikationen: Common UNIX Printing System

Originalnachricht

This is a multi-part message in MIME format...

------------=_1176763201-8862-4080


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2007:086
http://www.mandriva.com/security/
_______________________________________________________________________

Package : cups
Date : April 16, 2007
Affected: 2007.0, Corporate 3.0, Corporate 4.0
_______________________________________________________________________

Problem Description:

A flaw was discovered in how CUPS handled SSL negotiation that could
allow a remote attacker capable of connecting to the CUPS daemon to
cause a DoS to other CUPS users.

Updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0720
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
58148107fd3c3a3a58cf40893f210d19 2007.0/i586/cups-1.2.4-1.2mdv2007.0.i586.rpm
facc569515fe2bfb4cd486c97933db38
2007.0/i586/cups-common-1.2.4-1.2mdv2007.0.i586.rpm
4d098ae29c18349d340358a8dd34dd71
2007.0/i586/cups-serial-1.2.4-1.2mdv2007.0.i586.rpm
170742c5f714668e61e86f8c81a8b4ed
2007.0/i586/libcups2-1.2.4-1.2mdv2007.0.i586.rpm
5f0235cecf775ca3fe56ec84cc84d20f
2007.0/i586/libcups2-devel-1.2.4-1.2mdv2007.0.i586.rpm
bd0b0eca41194be209e4241d719e1599
2007.0/i586/php-cups-1.2.4-1.2mdv2007.0.i586.rpm
dfee0796289f4931ce50315338a9039a 2007.0/SRPMS/cups-1.2.4-1.2mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
f6ff5e5b6974a5643e95d25064a0d376
2007.0/x86_64/cups-1.2.4-1.2mdv2007.0.x86_64.rpm
000003ae00365d65f11d2ba66e23f497
2007.0/x86_64/cups-common-1.2.4-1.2mdv2007.0.x86_64.rpm
abd32c1b9604f1b37a2aa2b0d388f815
2007.0/x86_64/cups-serial-1.2.4-1.2mdv2007.0.x86_64.rpm
275f077df3d38e0d37c5c364dc213141
2007.0/x86_64/lib64cups2-1.2.4-1.2mdv2007.0.x86_64.rpm
9a1fb3565074c9f4094e66085f00cdcf
2007.0/x86_64/lib64cups2-devel-1.2.4-1.2mdv2007.0.x86_64.rpm
dd2efd3e7bd0fa76688331be58b41e61
2007.0/x86_64/php-cups-1.2.4-1.2mdv2007.0.x86_64.rpm
dfee0796289f4931ce50315338a9039a 2007.0/SRPMS/cups-1.2.4-1.2mdv2007.0.src.rpm

Corporate 3.0:
e1a992d26240a580991dac68aec96bff
corporate/3.0/i586/cups-1.1.20-5.11.C30mdk.i586.rpm
098a0436371e4f2747f46739206c178f
corporate/3.0/i586/cups-common-1.1.20-5.11.C30mdk.i586.rpm
03b7c186d7594edc6434851ee21f995a
corporate/3.0/i586/cups-serial-1.1.20-5.11.C30mdk.i586.rpm
440f161baeb56539f78571be69ed70e2
corporate/3.0/i586/libcups2-1.1.20-5.11.C30mdk.i586.rpm
fb5996ef6a12ab6f290a7594fa3a3cb0
corporate/3.0/i586/libcups2-devel-1.1.20-5.11.C30mdk.i586.rpm
3c8b04f6b0af669313979cb23feddb6d
corporate/3.0/SRPMS/cups-1.1.20-5.11.C30mdk.src.rpm

Corporate 3.0/X86_64:
86852aacc829b9efcd03b544a55fdca0
corporate/3.0/x86_64/cups-1.1.20-5.11.C30mdk.x86_64.rpm
ebd138190f39f88c1eace2aa522ea034
corporate/3.0/x86_64/cups-common-1.1.20-5.11.C30mdk.x86_64.rpm
3fad1b6fa25230cd0dcf078b8edd24ad
corporate/3.0/x86_64/cups-serial-1.1.20-5.11.C30mdk.x86_64.rpm
35a7e3c3dee5397c703d4ced6be57138
corporate/3.0/x86_64/lib64cups2-1.1.20-5.11.C30mdk.x86_64.rpm
f1098a89091ab49d1a65c3827f222e45
corporate/3.0/x86_64/lib64cups2-devel-1.1.20-5.11.C30mdk.x86_64.rpm
3c8b04f6b0af669313979cb23feddb6d
corporate/3.0/SRPMS/cups-1.1.20-5.11.C30mdk.src.rpm

Corporate 4.0:
73b593b17afd8c7d3e4df79e382c6bf9
corporate/4.0/i586/cups-1.2.4-0.2.20060mlcs4.i586.rpm
287de87164fd603d9233ea5dd2460878
corporate/4.0/i586/cups-common-1.2.4-0.2.20060mlcs4.i586.rpm
2f164f0d981a3f2cbfaedadc9b60ec82
corporate/4.0/i586/cups-serial-1.2.4-0.2.20060mlcs4.i586.rpm
f84b48d2c09d77d8a4a038724f90c8ce
corporate/4.0/i586/libcups2-1.2.4-0.2.20060mlcs4.i586.rpm
092cb69b720a81b2fc8f8374eefde9b5
corporate/4.0/i586/libcups2-devel-1.2.4-0.2.20060mlcs4.i586.rpm
6fb17dd9e47a3f1fb081b0abeba74a21
corporate/4.0/i586/php-cups-1.2.4-0.2.20060mlcs4.i586.rpm
4aa9d021fb9ca6947ee0042842c0d9f7
corporate/4.0/SRPMS/cups-1.2.4-0.2.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
6910e854380e4bdfd873f030e6cf56a1
corporate/4.0/x86_64/cups-1.2.4-0.2.20060mlcs4.x86_64.rpm
3ea4c63c9a77d8853b31edc6b27cd947
corporate/4.0/x86_64/cups-common-1.2.4-0.2.20060mlcs4.x86_64.rpm
202a71ab90bd78c62b49bcfdb8f87e6d
corporate/4.0/x86_64/cups-serial-1.2.4-0.2.20060mlcs4.x86_64.rpm
adbd7e8c128a869f72eec99f8ab2675c
corporate/4.0/x86_64/lib64cups2-1.2.4-0.2.20060mlcs4.x86_64.rpm
3511b5438cb8539645853e125ce633d2
corporate/4.0/x86_64/lib64cups2-devel-1.2.4-0.2.20060mlcs4.x86_64.rpm
8ac429c561e74613ad99a90ca81bf081
corporate/4.0/x86_64/php-cups-1.2.4-0.2.20060mlcs4.x86_64.rpm
4aa9d021fb9ca6947ee0042842c0d9f7
corporate/4.0/SRPMS/cups-1.2.4-0.2.20060mlcs4.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGI84amqjQ0CJFipgRAgYDAJsGtmc+dDF4MVXsbIZ4yf8B5riUXwCg4IFQ
CgJu6KFTY1qUujdG8UgYemI=
=gZF6
-----END PGP SIGNATURE-----


------------=_1176763201-8862-4080
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1176763201-8862-4080--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung