Login
Newsletter
Werbung

Sicherheit: Zahlenüberläufe in cups
Aktuelle Meldungen Distributionen
Name: Zahlenüberläufe in cups
ID: RHSA-2005:132-01
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux
Datum: Fr, 18. Februar 2005, 12:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0206
Applikationen: Common UNIX Printing System

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Important: cups security update
Advisory ID: RHSA-2005:132-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-132.html
Issue date: 2005-02-18
Updated on: 2005-02-18
Product: Red Hat Enterprise Linux
Obsoletes: RHSA-2004:543
CVE Names: CAN-2005-0206
---------------------------------------------------------------------

1. Summary:

Updated cups packages that fix a security issue are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

The Common UNIX Printing System (CUPS) is a print spooler.

During a source code audit, Chris Evans discovered a number of integer
overflow bugs that affect Xpdf. CUPS contained a copy of the Xpdf code
used for parsing PDF files and was therefore affected by these bugs. The
Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the
name CAN-2004-0888 to this issue, and Red Hat released erratum
RHSA-2004:543 with updated packages.

It was found that the patch used to correct this issue was not sufficient
and did not fully protect CUPS running on 64-bit architectures. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2005-0206 to this issue.

These updated packages also include a fix that prevents the CUPS
initscript from being accidentally replaced.

All users of CUPS on 64-bit architectures should upgrade to these updated
packages, which contain a corrected patch and are not vulnerable to these
issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

135378 - CAN-2004-0888 xpdf issues affect cups

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/cups-1.1.17-13.3.27.src.rpm
1ca98f1f5febd86bbffd2d9fea1e0e1e cups-1.1.17-13.3.27.src.rpm

i386:
f6104caf27bb21ad67f198319fd4cc95 cups-1.1.17-13.3.27.i386.rpm
6ec238f22033f8ee1d276d5199a24674 cups-devel-1.1.17-13.3.27.i386.rpm
0a13cb856be593ee65af8897a55e7096 cups-libs-1.1.17-13.3.27.i386.rpm

ia64:
197b6abe4fb153a8741817093ba58dda cups-1.1.17-13.3.27.ia64.rpm
0ccc933c63e966874bef2cc81d1efc86 cups-devel-1.1.17-13.3.27.ia64.rpm
ad247ca0c4e4201d8477877be9b2f1ad cups-libs-1.1.17-13.3.27.ia64.rpm
0a13cb856be593ee65af8897a55e7096 cups-libs-1.1.17-13.3.27.i386.rpm

ppc:
f0281159b37f277befa0f5a165d04ccd cups-1.1.17-13.3.27.ppc.rpm
0cf8168e59ddee013e070a3d754dddd6 cups-devel-1.1.17-13.3.27.ppc.rpm
79f954ef8ed389b3e48f5d66fc1937f8 cups-libs-1.1.17-13.3.27.ppc.rpm
f82140b38c712450d6ee507cc003ab90 cups-libs-1.1.17-13.3.27.ppc64.rpm

s390:
d7af94a9f8e711d85c9abfee9b0619f2 cups-1.1.17-13.3.27.s390.rpm
7786faa68f814a37e1b4979a22b2aec4 cups-devel-1.1.17-13.3.27.s390.rpm
fbfc97f372d0010300a9ac1094e19a04 cups-libs-1.1.17-13.3.27.s390.rpm

s390x:
231161818abf90a6746cf50fca215250 cups-1.1.17-13.3.27.s390x.rpm
8f622556db1d14d833347d5629439a94 cups-devel-1.1.17-13.3.27.s390x.rpm
b7b6ab4b8d1cd37e6ea31bd97b4630ec cups-libs-1.1.17-13.3.27.s390x.rpm
fbfc97f372d0010300a9ac1094e19a04 cups-libs-1.1.17-13.3.27.s390.rpm

x86_64:
7b68b04b926693bec7ad1d74ddbbfeb5 cups-1.1.17-13.3.27.x86_64.rpm
b3b88c0f375bf459af82b87e0a66d0e7 cups-devel-1.1.17-13.3.27.x86_64.rpm
92710b16c28b8e71fc7b82e7e8f743fd cups-libs-1.1.17-13.3.27.x86_64.rpm
0a13cb856be593ee65af8897a55e7096 cups-libs-1.1.17-13.3.27.i386.rpm

Red Hat Desktop version 3:

SRPMS:
cups-1.1.17-13.3.27.src.rpm
1ca98f1f5febd86bbffd2d9fea1e0e1e cups-1.1.17-13.3.27.src.rpm

i386:
f6104caf27bb21ad67f198319fd4cc95 cups-1.1.17-13.3.27.i386.rpm
6ec238f22033f8ee1d276d5199a24674 cups-devel-1.1.17-13.3.27.i386.rpm
0a13cb856be593ee65af8897a55e7096 cups-libs-1.1.17-13.3.27.i386.rpm

x86_64:
7b68b04b926693bec7ad1d74ddbbfeb5 cups-1.1.17-13.3.27.x86_64.rpm
b3b88c0f375bf459af82b87e0a66d0e7 cups-devel-1.1.17-13.3.27.x86_64.rpm
92710b16c28b8e71fc7b82e7e8f743fd cups-libs-1.1.17-13.3.27.x86_64.rpm
0a13cb856be593ee65af8897a55e7096 cups-libs-1.1.17-13.3.27.i386.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/cups-1.1.17-13.3.27.src.rpm
1ca98f1f5febd86bbffd2d9fea1e0e1e cups-1.1.17-13.3.27.src.rpm

i386:
f6104caf27bb21ad67f198319fd4cc95 cups-1.1.17-13.3.27.i386.rpm
6ec238f22033f8ee1d276d5199a24674 cups-devel-1.1.17-13.3.27.i386.rpm
0a13cb856be593ee65af8897a55e7096 cups-libs-1.1.17-13.3.27.i386.rpm

ia64:
197b6abe4fb153a8741817093ba58dda cups-1.1.17-13.3.27.ia64.rpm
0ccc933c63e966874bef2cc81d1efc86 cups-devel-1.1.17-13.3.27.ia64.rpm
ad247ca0c4e4201d8477877be9b2f1ad cups-libs-1.1.17-13.3.27.ia64.rpm
0a13cb856be593ee65af8897a55e7096 cups-libs-1.1.17-13.3.27.i386.rpm

x86_64:
7b68b04b926693bec7ad1d74ddbbfeb5 cups-1.1.17-13.3.27.x86_64.rpm
b3b88c0f375bf459af82b87e0a66d0e7 cups-devel-1.1.17-13.3.27.x86_64.rpm
92710b16c28b8e71fc7b82e7e8f743fd cups-libs-1.1.17-13.3.27.x86_64.rpm
0a13cb856be593ee65af8897a55e7096 cups-libs-1.1.17-13.3.27.i386.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/cups-1.1.17-13.3.27.src.rpm
1ca98f1f5febd86bbffd2d9fea1e0e1e cups-1.1.17-13.3.27.src.rpm

i386:
f6104caf27bb21ad67f198319fd4cc95 cups-1.1.17-13.3.27.i386.rpm
6ec238f22033f8ee1d276d5199a24674 cups-devel-1.1.17-13.3.27.i386.rpm
0a13cb856be593ee65af8897a55e7096 cups-libs-1.1.17-13.3.27.i386.rpm

ia64:
197b6abe4fb153a8741817093ba58dda cups-1.1.17-13.3.27.ia64.rpm
0ccc933c63e966874bef2cc81d1efc86 cups-devel-1.1.17-13.3.27.ia64.rpm
ad247ca0c4e4201d8477877be9b2f1ad cups-libs-1.1.17-13.3.27.ia64.rpm
0a13cb856be593ee65af8897a55e7096 cups-libs-1.1.17-13.3.27.i386.rpm

x86_64:
7b68b04b926693bec7ad1d74ddbbfeb5 cups-1.1.17-13.3.27.x86_64.rpm
b3b88c0f375bf459af82b87e0a66d0e7 cups-devel-1.1.17-13.3.27.x86_64.rpm
92710b16c28b8e71fc7b82e7e8f743fd cups-libs-1.1.17-13.3.27.x86_64.rpm
0a13cb856be593ee65af8897a55e7096 cups-libs-1.1.17-13.3.27.i386.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0206

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCFgxyXlSAg2UNWIIRAueIAJ4t70dXF8ySPpMCYNaMTa3/xp25sgCglEH1
iE4k+8Phwg5VBnwPTHDVSFI=
=oNGr
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung