MDKSA-2004:164 - Updated cups packages fix buffer overflow vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: cups
Advisory ID: MDKSA-2004:164
Date: December 29th, 2004
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1,
Multi Network Firewall 8.2
______________________________________________________________________
Problem Description:
iDefense reported a buffer overflow vulnerability, which affects
versions of xpdf <= xpdf-3.0 and several programs, like cups,
which use embedded xpdf code. An attacker could construct a malicious
payload file which could enable arbitrary code execution on the target
system.
The updated packages are patched to protect against these
vulnerabilities.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
b67d5934f8bd177099ebf8e1b6540ae3 10.0/RPMS/cups-1.1.20-5.4.100mdk.i586.rpm
f4b17f9ba9cf26a25cdaafa9726daa0f
10.0/RPMS/cups-common-1.1.20-5.4.100mdk.i586.rpm
99ad562f47750a34e1a0f0cc99eae4e5
10.0/RPMS/cups-serial-1.1.20-5.4.100mdk.i586.rpm
cef2d19f980919ef1e9a2b8af3b4cead 10.0/RPMS/libcups2-1.1.20-5.4.100mdk.i586.rpm
29fdd34d49359c8b389aba91dde1b422
10.0/RPMS/libcups2-devel-1.1.20-5.4.100mdk.i586.rpm
c4e5d026db917225f268762c8c9369a7 10.0/SRPMS/cups-1.1.20-5.4.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
f2cb9fa8e8920286146f1ff050cf15bb
amd64/10.0/RPMS/cups-1.1.20-5.4.100mdk.amd64.rpm
20e5ab702ab16b5b08eec1dbce974140
amd64/10.0/RPMS/cups-common-1.1.20-5.4.100mdk.amd64.rpm
d93ee753b292aa9b3805d3ff4593abd5
amd64/10.0/RPMS/cups-serial-1.1.20-5.4.100mdk.amd64.rpm
d27eed817250622d43685e17a56b4d9c
amd64/10.0/RPMS/lib64cups2-1.1.20-5.4.100mdk.amd64.rpm
c2d560945ec3da09a626ff00721f0d08
amd64/10.0/RPMS/lib64cups2-devel-1.1.20-5.4.100mdk.amd64.rpm
c4e5d026db917225f268762c8c9369a7
amd64/10.0/SRPMS/cups-1.1.20-5.4.100mdk.src.rpm
Mandrakelinux 10.1:
1fbddd234794b114962d24f83f6b26c0
10.1/RPMS/cups-1.1.21-0.rc1.7.2.101mdk.i586.rpm
4dd08ed3f27234979966236d33d76477
10.1/RPMS/cups-common-1.1.21-0.rc1.7.2.101mdk.i586.rpm
94b97f6c8c00fd012af6bd879985e9a6
10.1/RPMS/cups-serial-1.1.21-0.rc1.7.2.101mdk.i586.rpm
08e6da39f555e62348139051f18b2af3
10.1/RPMS/libcups2-1.1.21-0.rc1.7.2.101mdk.i586.rpm
c57382ac31a060d385b66794f4ff8050
10.1/RPMS/libcups2-devel-1.1.21-0.rc1.7.2.101mdk.i586.rpm
fbaac3fb9814e4f267ee540234c10b87
10.1/SRPMS/cups-1.1.21-0.rc1.7.2.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
02ccc7c75c3ccf94b6e3ad8a8f0dc728
x86_64/10.1/RPMS/cups-1.1.21-0.rc1.7.2.101mdk.x86_64.rpm
00eab10124a6828418d610797de1e5e6
x86_64/10.1/RPMS/cups-common-1.1.21-0.rc1.7.2.101mdk.x86_64.rpm
7d435407629f3e9498aaec4fcbf3a8ed
x86_64/10.1/RPMS/cups-serial-1.1.21-0.rc1.7.2.101mdk.x86_64.rpm
65d3ef99d93326b35767ac5db613158c
x86_64/10.1/RPMS/lib64cups2-1.1.21-0.rc1.7.2.101mdk.x86_64.rpm
740e302fd7e121aa94ee35453859dead
x86_64/10.1/RPMS/lib64cups2-devel-1.1.21-0.rc1.7.2.101mdk.x86_64.rpm
fbaac3fb9814e4f267ee540234c10b87
x86_64/10.1/SRPMS/cups-1.1.21-0.rc1.7.2.101mdk.src.rpm
Corporate Server 2.1:
d076c80f75d8ffcc9482cedf9d7bba09
corporate/2.1/RPMS/cups-1.1.18-2.6.C21mdk.i586.rpm
0a6a8091417391e595ef9959bca25b3c
corporate/2.1/RPMS/cups-common-1.1.18-2.6.C21mdk.i586.rpm
9685d21a06acaf51f4d02978bdf5d01b
corporate/2.1/RPMS/cups-serial-1.1.18-2.6.C21mdk.i586.rpm
536209e55abf0107247b8fe8bcbda66c
corporate/2.1/RPMS/libcups1-1.1.18-2.6.C21mdk.i586.rpm
345a920fe9f393a30ac77c40e61dea38
corporate/2.1/RPMS/libcups1-devel-1.1.18-2.6.C21mdk.i586.rpm
4046c29307f4afade503d5d6aff22fde
corporate/2.1/SRPMS/cups-1.1.18-2.6.C21mdk.src.rpm
Corporate Server 2.1/x86_64:
cf56b0736fe0f35469bad4856379b5ec
x86_64/corporate/2.1/RPMS/cups-1.1.18-2.6.C21mdk.x86_64.rpm
0b1661b006baf8d20e106f63e420adde
x86_64/corporate/2.1/RPMS/cups-common-1.1.18-2.6.C21mdk.x86_64.rpm
d5ce269bc10cd9135bbfabffd4ea02f5
x86_64/corporate/2.1/RPMS/cups-serial-1.1.18-2.6.C21mdk.x86_64.rpm
60b2c68c31e04397eaca15b5ea728c6f
x86_64/corporate/2.1/RPMS/libcups1-1.1.18-2.6.C21mdk.x86_64.rpm
36dcd647bcc3ba5f33cf2dd9b3575b48
x86_64/corporate/2.1/RPMS/libcups1-devel-1.1.18-2.6.C21mdk.x86_64.rpm
4046c29307f4afade503d5d6aff22fde
x86_64/corporate/2.1/SRPMS/cups-1.1.18-2.6.C21mdk.src.rpm
Mandrakelinux 9.2:
69985b160e53ed0347dd82f2972203d6 9.2/RPMS/cups-1.1.19-10.4.92mdk.i586.rpm
babb7de6513995617a4f8001e18c2242
9.2/RPMS/cups-common-1.1.19-10.4.92mdk.i586.rpm
394d55ca555dafc97f06a7c7ff9d2db3
9.2/RPMS/cups-serial-1.1.19-10.4.92mdk.i586.rpm
a52b336ab465412cae594191e90ab5e5 9.2/RPMS/libcups2-1.1.19-10.4.92mdk.i586.rpm
6bc6c365596ec6e091cadf64101ffbe2
9.2/RPMS/libcups2-devel-1.1.19-10.4.92mdk.i586.rpm
2ae6f83a4d7816662d426ccde81dfdbe 9.2/SRPMS/cups-1.1.19-10.4.92mdk.src.rpm
Mandrakelinux 9.2/AMD64:
af7c42d1eaafd736d7eb568ab8bc0e56
amd64/9.2/RPMS/cups-1.1.19-10.4.92mdk.amd64.rpm
8baf2bba293b959a061d02563dc51d2d
amd64/9.2/RPMS/cups-common-1.1.19-10.4.92mdk.amd64.rpm
09117deea33a1d5c89e0d9302eb1b6d2
amd64/9.2/RPMS/cups-serial-1.1.19-10.4.92mdk.amd64.rpm
7c3ad6a81022d25ad42e95d7dd373e15
amd64/9.2/RPMS/lib64cups2-1.1.19-10.4.92mdk.amd64.rpm
39eceead4c480afa4f71e791313dbcb7
amd64/9.2/RPMS/lib64cups2-devel-1.1.19-10.4.92mdk.amd64.rpm
2ae6f83a4d7816662d426ccde81dfdbe
amd64/9.2/SRPMS/cups-1.1.19-10.4.92mdk.src.rpm
Multi Network Firewall 8.2:
f9795b9106fc6f6193195a20b517f14e
mnf8.2/RPMS/libcups1-1.1.18-2.4.M82mdk.i586.rpm
49a95e429e7df165a8911191ab085354 mnf8.2/SRPMS/cups-1.1.18-2.4.M82mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain
the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQFB03+XmqjQ0CJFipgRAqT+AJ0XSRrCHhoPmDwofiZ9Vs8fkjf70ACgjVQ/
/BLgR1EzSDwyBim6CRgQH8U=
=S1lD
-----END PGP SIGNATURE-----