Login
Newsletter
Werbung

Sicherheit: Zahlenüberlauf in cups
Aktuelle Meldungen Distributionen
Name: Zahlenüberlauf in cups
ID: MDVSA-2008:170
Distribution: Mandriva
Plattformen: Mandriva Corporate 3.0, Mandriva Multi Network Firewall 2.0, Mandriva Corporate 4.0, Mandriva 2007.1, Mandriva 2008.0, Mandriva 2008.1
Datum: Do, 14. August 2008, 06:45
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1722
Applikationen: Common UNIX Printing System

Originalnachricht

This is a multi-part message in MIME format...

------------=_1218689139-11275-8125


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:170
http://www.mandriva.com/security/
_______________________________________________________________________

Package : cups
Date : August 13, 2008
Affected: 2007.1, 2008.0, 2008.1, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

Thomas Pollet discovered an integer overflow vulnerability in the PNG
image handling filter in CUPS. This could allow a malicious user to
execute arbitrary code with the privileges of the user running CUPS,
or cause a denial of service by sending a specially crafted PNG image
to the print server (CVE-2008-1722).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1722
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.1:
e6e836d1d60b2fa4e89626ca342718da
2007.1/i586/cups-1.2.10-2.7mdv2007.1.i586.rpm
23bbf517fb49c494c964f2fd0c7e486f
2007.1/i586/cups-common-1.2.10-2.7mdv2007.1.i586.rpm
0dcf242590878f1bcc19a9a67f2bf6f8
2007.1/i586/cups-serial-1.2.10-2.7mdv2007.1.i586.rpm
b13c0e72bbbc55e9fc5d1d2fa233c815
2007.1/i586/libcups2-1.2.10-2.7mdv2007.1.i586.rpm
43ae6ae77fe663392eab35dd6e86dcf9
2007.1/i586/libcups2-devel-1.2.10-2.7mdv2007.1.i586.rpm
c485c64d51554dcae1636bae567d52bb
2007.1/i586/php-cups-1.2.10-2.7mdv2007.1.i586.rpm
02cf79142cb3188f74ac7b23826531ec
2007.1/SRPMS/cups-1.2.10-2.7mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
8704d20431f56cdfbfa2a81ff0c9716b
2007.1/x86_64/cups-1.2.10-2.7mdv2007.1.x86_64.rpm
e347090c027bfceb5d36077750bbde52
2007.1/x86_64/cups-common-1.2.10-2.7mdv2007.1.x86_64.rpm
03a84b9825640e559c2f22c0d498324d
2007.1/x86_64/cups-serial-1.2.10-2.7mdv2007.1.x86_64.rpm
8992cab63c56d088ac5e7f6e47c1380f
2007.1/x86_64/lib64cups2-1.2.10-2.7mdv2007.1.x86_64.rpm
3dfee471c6ab99379610af928d074063
2007.1/x86_64/lib64cups2-devel-1.2.10-2.7mdv2007.1.x86_64.rpm
d1803179503ff874539580d027d50f0e
2007.1/x86_64/php-cups-1.2.10-2.7mdv2007.1.x86_64.rpm
02cf79142cb3188f74ac7b23826531ec
2007.1/SRPMS/cups-1.2.10-2.7mdv2007.1.src.rpm

Mandriva Linux 2008.0:
ad1944423890980426468c9d2cc35292 2008.0/i586/cups-1.3.6-1.2mdv2008.0.i586.rpm
e2da311a716df6075450e3fc700f8fa0
2008.0/i586/cups-common-1.3.6-1.2mdv2008.0.i586.rpm
26952cab7a9352b7ee261e324cb2a864
2008.0/i586/cups-serial-1.3.6-1.2mdv2008.0.i586.rpm
596464ca36baba5e1ea8a3b82c0b5aca
2008.0/i586/libcups2-1.3.6-1.2mdv2008.0.i586.rpm
38628e8316b29e266bbfce642ff40ed4
2008.0/i586/libcups2-devel-1.3.6-1.2mdv2008.0.i586.rpm
16a7a67f6ea9d0533500a02f5fc2197d
2008.0/i586/php-cups-1.3.6-1.2mdv2008.0.i586.rpm
cf55fd60312efe614352598a124ad721 2008.0/SRPMS/cups-1.3.6-1.2mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
bc0185dc8eb598431661de50b6b67538
2008.0/x86_64/cups-1.3.6-1.2mdv2008.0.x86_64.rpm
07bc12fc705e94ba554b915b48778726
2008.0/x86_64/cups-common-1.3.6-1.2mdv2008.0.x86_64.rpm
bb085c47b0c75e6244d25c3ac6575013
2008.0/x86_64/cups-serial-1.3.6-1.2mdv2008.0.x86_64.rpm
7cae6612c1bcc43b0d8ecc14dd24b2b7
2008.0/x86_64/lib64cups2-1.3.6-1.2mdv2008.0.x86_64.rpm
b3566be34e2041b40f7ed6be97cec831
2008.0/x86_64/lib64cups2-devel-1.3.6-1.2mdv2008.0.x86_64.rpm
02195805095b57b48f41f82ae25ba35e
2008.0/x86_64/php-cups-1.3.6-1.2mdv2008.0.x86_64.rpm
cf55fd60312efe614352598a124ad721 2008.0/SRPMS/cups-1.3.6-1.2mdv2008.0.src.rpm

Mandriva Linux 2008.1:
cead86dad7a602167161f8e62fd6c43c 2008.1/i586/cups-1.3.6-5.1mdv2008.1.i586.rpm
2c3a0be519d0f027ef9ad58a0502ea06
2008.1/i586/cups-common-1.3.6-5.1mdv2008.1.i586.rpm
40a13e5f2d2d7b557cc3cd18a271444a
2008.1/i586/cups-serial-1.3.6-5.1mdv2008.1.i586.rpm
f7ac7c6daa9e94d7be7215d20b5a9dd8
2008.1/i586/libcups2-1.3.6-5.1mdv2008.1.i586.rpm
4e684a41c2174acc19a3ca26917503a5
2008.1/i586/libcups2-devel-1.3.6-5.1mdv2008.1.i586.rpm
cd62b541b3a8ff5076081aaa98dcd186
2008.1/i586/php-cups-1.3.6-5.1mdv2008.1.i586.rpm
2eed67e578b217fe60b9b88dd8f67efe 2008.1/SRPMS/cups-1.3.6-5.1mdv2008.1.src.rpm

Mandriva Linux 2008.1/X86_64:
6260df80fd2ed6a506cda8b8e08a8965
2008.1/x86_64/cups-1.3.6-5.1mdv2008.1.x86_64.rpm
4d4f83b7b4c345ed09bcf7a30bcf563c
2008.1/x86_64/cups-common-1.3.6-5.1mdv2008.1.x86_64.rpm
ff623fb9ade013d2e9162171cda2987b
2008.1/x86_64/cups-serial-1.3.6-5.1mdv2008.1.x86_64.rpm
452d007674d0bf192a1b1e142b5b8425
2008.1/x86_64/lib64cups2-1.3.6-5.1mdv2008.1.x86_64.rpm
ec07d9fdf765dbccea3a85d65301b12f
2008.1/x86_64/lib64cups2-devel-1.3.6-5.1mdv2008.1.x86_64.rpm
3dc1a8a3673ed4c98b706067eea40b1d
2008.1/x86_64/php-cups-1.3.6-5.1mdv2008.1.x86_64.rpm
2eed67e578b217fe60b9b88dd8f67efe 2008.1/SRPMS/cups-1.3.6-5.1mdv2008.1.src.rpm

Corporate 3.0:
0c84961ab135d0c81a59983b423e6f38
corporate/3.0/i586/cups-1.1.20-5.18.C30mdk.i586.rpm
33e08698de8935b7b3bb627693e3977e
corporate/3.0/i586/cups-common-1.1.20-5.18.C30mdk.i586.rpm
45a222373a898a51475335072a37398e
corporate/3.0/i586/cups-serial-1.1.20-5.18.C30mdk.i586.rpm
5c5f642a54212359ea0fe8bc8f48820f
corporate/3.0/i586/libcups2-1.1.20-5.18.C30mdk.i586.rpm
808274f44ab2b83782d86aa500f1af68
corporate/3.0/i586/libcups2-devel-1.1.20-5.18.C30mdk.i586.rpm
ff5c02e7f7db059ac70e3ca452888d28
corporate/3.0/SRPMS/cups-1.1.20-5.18.C30mdk.src.rpm

Corporate 3.0/X86_64:
63551ab65fc917f0ea559087868fe913
corporate/3.0/x86_64/cups-1.1.20-5.18.C30mdk.x86_64.rpm
9df06fb96d03ceafeccb24e542ad0d89
corporate/3.0/x86_64/cups-common-1.1.20-5.18.C30mdk.x86_64.rpm
05e18474c9421cd3e7c6e56bc6429c7a
corporate/3.0/x86_64/cups-serial-1.1.20-5.18.C30mdk.x86_64.rpm
37836aa82b213bd6b1354acd78361cef
corporate/3.0/x86_64/lib64cups2-1.1.20-5.18.C30mdk.x86_64.rpm
a8ba97db51bda184b146fa0e29a31cc5
corporate/3.0/x86_64/lib64cups2-devel-1.1.20-5.18.C30mdk.x86_64.rpm
ff5c02e7f7db059ac70e3ca452888d28
corporate/3.0/SRPMS/cups-1.1.20-5.18.C30mdk.src.rpm

Corporate 4.0:
039665809c005439fb99e971b676f535
corporate/4.0/i586/cups-1.2.4-0.9.20060mlcs4.i586.rpm
bce68ebe471af117fa0dd2033f6f18ea
corporate/4.0/i586/cups-common-1.2.4-0.9.20060mlcs4.i586.rpm
434e0523b009d495b074e4efd595f36f
corporate/4.0/i586/cups-serial-1.2.4-0.9.20060mlcs4.i586.rpm
3988cb0f999fb944ca315c80ecbac584
corporate/4.0/i586/libcups2-1.2.4-0.9.20060mlcs4.i586.rpm
8e805b458bb1b3d7539b1be47245b87c
corporate/4.0/i586/libcups2-devel-1.2.4-0.9.20060mlcs4.i586.rpm
53cf97e5264d4e4e553ca58786b83f99
corporate/4.0/i586/php-cups-1.2.4-0.9.20060mlcs4.i586.rpm
4d3500f0c88fd849eed34e07325132ce
corporate/4.0/SRPMS/cups-1.2.4-0.9.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
b42cb1248dcb970ed386feb61e0053fd
corporate/4.0/x86_64/cups-1.2.4-0.9.20060mlcs4.x86_64.rpm
23eaf7aff2f39c1f04007e10ebba98d0
corporate/4.0/x86_64/cups-common-1.2.4-0.9.20060mlcs4.x86_64.rpm
80f678e23d28a1e05c70a9e372538172
corporate/4.0/x86_64/cups-serial-1.2.4-0.9.20060mlcs4.x86_64.rpm
7394b5abd24c4e55ad9bcb906c8fe397
corporate/4.0/x86_64/lib64cups2-1.2.4-0.9.20060mlcs4.x86_64.rpm
dd46af363759816c8336d31c6da9c947
corporate/4.0/x86_64/lib64cups2-devel-1.2.4-0.9.20060mlcs4.x86_64.rpm
af0d19bf838e3f8d548ab669459c1506
corporate/4.0/x86_64/php-cups-1.2.4-0.9.20060mlcs4.x86_64.rpm
4d3500f0c88fd849eed34e07325132ce
corporate/4.0/SRPMS/cups-1.2.4-0.9.20060mlcs4.src.rpm

Multi Network Firewall 2.0:
0aa4175864fda95cc92b056ee8186fec
mnf/2.0/i586/libcups2-1.1.20-5.18.C30mdk.i586.rpm
28e071126d2fbb4afaa0e35299440843
mnf/2.0/SRPMS/cups-1.1.20-5.18.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFIo4jlmqjQ0CJFipgRAqHiAJ497++hlRzlTIWz1CKrGswLJ1TvNQCfemi8
ae/GaLEhDVGg1Bc6PHLtTYg=
=gLWC
-----END PGP SIGNATURE-----


------------=_1218689139-11275-8125
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1218689139-11275-8125--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung