LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: August 25th, 2014
Linux Advisory Watch: August 15th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandrake: Updated cups packages fix Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CAN-2004-0888). This also affects applications like cups, that use embedded versions of xpdf. The updated packages are patched to deal with these issues.
 _______________________________________________________________________

                 Mandrakelinux Security Update Advisory
 _______________________________________________________________________

 Package name:           cups
 Advisory ID:            MDKSA-2005:041
 Date:                   February 17th, 2005

 Affected versions:	 9.2, 10.0, 10.1, Corporate 3.0,
                         Corporate Server 2.1
 ______________________________________________________________________

 Problem Description:

 Previous updates to correct integer overflow issues affecting xpdf
 overlooked certain conditions when built for a 64 bit platform.
 (formerly CAN-2004-0888). This also affects applications like cups, 
 that use embedded versions of xpdf.
 
 The updated packages are patched to deal with these issues.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0206
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0/AMD64:
 0863a33d5e67873f53c0b8fa1d2f4384  amd64/10.0/RPMS/cups-1.1.20-5.7.100mdk.amd64.rpm
 3822cee8837630a96f78a33d3bf1bd4a  amd64/10.0/RPMS/cups-common-1.1.20-5.7.100mdk.amd64.rpm
 931290407a940ff87909496292ac8912  amd64/10.0/RPMS/cups-serial-1.1.20-5.7.100mdk.amd64.rpm
 929258c3e29a676e5a91393412105271  amd64/10.0/RPMS/lib64cups2-1.1.20-5.7.100mdk.amd64.rpm
 91a2b0e5dbf46c66147297a9896d2d6d  amd64/10.0/RPMS/lib64cups2-devel-1.1.20-5.7.100mdk.amd64.rpm
 d814596362f8e2d01855161ec94bea9e  amd64/10.0/SRPMS/cups-1.1.20-5.7.100mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 4907f2fb60a614b25f326c54f6937acf  x86_64/10.1/RPMS/cups-1.1.21-0.rc1.7.5.101mdk.x86_64.rpm
 6cdb17b703326feb5a831329b0e7f1eb  x86_64/10.1/RPMS/cups-common-1.1.21-0.rc1.7.5.101mdk.x86_64.rpm
 81080d7ceb102050b663d5eacdbed61a  x86_64/10.1/RPMS/cups-serial-1.1.21-0.rc1.7.5.101mdk.x86_64.rpm
 40c653a1689810a0555f19a88a7bf7ca  x86_64/10.1/RPMS/lib64cups2-1.1.21-0.rc1.7.5.101mdk.x86_64.rpm
 7abd4f4d3194e874aa54d66a32e5cd8d  x86_64/10.1/RPMS/lib64cups2-devel-1.1.21-0.rc1.7.5.101mdk.x86_64.rpm
 75dc2c7fad73b6a86b2991ec9374a6fc  x86_64/10.1/SRPMS/cups-1.1.21-0.rc1.7.5.101mdk.src.rpm

 Corporate Server 2.1/X86_64:
 91e06052bb835506724d476eba84fd40  x86_64/corporate/2.1/RPMS/cups-1.1.18-2.9.C21mdk.x86_64.rpm
 4f5c7d6820f07b71e6a68e6aa6d38eec  x86_64/corporate/2.1/RPMS/cups-common-1.1.18-2.9.C21mdk.x86_64.rpm
 4dfedb90e3f6249ea662bb47df938d16  x86_64/corporate/2.1/RPMS/cups-serial-1.1.18-2.9.C21mdk.x86_64.rpm
 94e043c2439c13e3b829298982fe1f42  x86_64/corporate/2.1/RPMS/libcups1-1.1.18-2.9.C21mdk.x86_64.rpm
 ff21acb50be45d2fba6b47fc65747db6  x86_64/corporate/2.1/RPMS/libcups1-devel-1.1.18-2.9.C21mdk.x86_64.rpm
 ef9b4b42e7d425fb1994a14c59a6b783  x86_64/corporate/2.1/SRPMS/cups-1.1.18-2.9.C21mdk.src.rpm

 Corporate 3.0/X86_64:
 d37f68dc8e316d66534b9e8c1271ac28  x86_64/corporate/3.0/RPMS/cups-1.1.20-5.7.C30mdk.x86_64.rpm
 5e2b3dfd3f0bd5c5663a941f8249eacb  x86_64/corporate/3.0/RPMS/cups-common-1.1.20-5.7.C30mdk.x86_64.rpm
 c3f4bfde26c351d68e69f08e32cab55e  x86_64/corporate/3.0/RPMS/cups-serial-1.1.20-5.7.C30mdk.x86_64.rpm
 66689b4a41a53463a7257add19dcee1b  x86_64/corporate/3.0/RPMS/lib64cups2-1.1.20-5.7.C30mdk.x86_64.rpm
 5b11a94570f61bf3c783cb9b3474e2c9  x86_64/corporate/3.0/RPMS/lib64cups2-devel-1.1.20-5.7.C30mdk.x86_64.rpm
 b1e5fe6870130ab6478dfa0becc16e74  x86_64/corporate/3.0/SRPMS/cups-1.1.20-5.7.C30mdk.src.rpm

 Mandrakelinux 9.2/AMD64:
 82d2b5794f51069b2e23aa0b2a451205  amd64/9.2/RPMS/cups-1.1.19-10.7.92mdk.amd64.rpm
 6fbc82f6e69736e2fca7c947c3f2e2ba  amd64/9.2/RPMS/cups-common-1.1.19-10.7.92mdk.amd64.rpm
 64452fd2b22d176811d43a4fad4704b5  amd64/9.2/RPMS/cups-serial-1.1.19-10.7.92mdk.amd64.rpm
 d317fdcd91d9c1974903025d6eb55da3  amd64/9.2/RPMS/lib64cups2-1.1.19-10.7.92mdk.amd64.rpm
 c52af110fdb57c8164e0efedc8074bbe  amd64/9.2/RPMS/lib64cups2-devel-1.1.19-10.7.92mdk.amd64.rpm
 8ed5be0556fac198f872fd7a160b8bf5  amd64/9.2/SRPMS/cups-1.1.19-10.7.92mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain
 the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesoft.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Mozilla reports user data leak from Bugzilla project
These 3-D Printed Skeleton Keys Can Pick High-Security Locks in Seconds
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.