LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: November 21st, 2014
Linux Security Week: November 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
RedHat: Moderate: cups security update Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
RedHat Linux Updated CUPS packages that fix a security issue are now available for Red Hat Enterprise Linux. This update has been rated as having moderate security impact by the Red Hat Security Response Team.
- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: cups security update
Advisory ID:       RHSA-2005:772-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-772.html
Issue date:        2005-09-27
Updated on:        2005-09-27
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-2874
- ---------------------------------------------------------------------

1. Summary:

Updated CUPS packages that fix a security issue are now available for Red
Hat Enterprise Linux.

This update has been rated as having moderate security impact by the Red 
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The Common UNIX Printing System (CUPS) provides a portable printing layer
for UNIX(R) operating systems.

A bug was found in the way CUPS processes malformed HTTP requests. It is
possible for a remote user capable of connecting to the CUPS daemon to
issue a malformed HTTP GET request that causes CUPS to enter an
infinite loop. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-2874 to this issue.

Two small bugs have also been fixed in this update.  A signal handling
problem has been fixed that could occasionally cause the scheduler to stop
when told to reload.  A problem with tracking open file descriptors under
certain specific circumstances has also been fixed.

All users of CUPS should upgrade to these erratum packages, which contain a
patch to correct this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

164641 - [PATCH] cupsd segfault when SIGCHLD received
164642 - Cupsd hangs on reading pipe with recycled file descriptor.
168072 - CAN-2005-2874 Malformed HTTP Request URL denial of service


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/cups-1.1.22-0.rc1.9.8.src.rpm
3d3b43d382f9bc219c019e288a14a1ac  cups-1.1.22-0.rc1.9.8.src.rpm

i386:
652b9075cea217d7e745c5f6cec0a1d9  cups-1.1.22-0.rc1.9.8.i386.rpm
7d646622a93e6007e11b255397c26731  cups-devel-1.1.22-0.rc1.9.8.i386.rpm
03eb88625ad7a9582fd65e1fdf85545c  cups-libs-1.1.22-0.rc1.9.8.i386.rpm

ia64:
09c6943b6f4258e4f079e876a45bed89  cups-1.1.22-0.rc1.9.8.ia64.rpm
b2e6ef0a1cd30ba9222efc817bfc6fe6  cups-devel-1.1.22-0.rc1.9.8.ia64.rpm
03eb88625ad7a9582fd65e1fdf85545c  cups-libs-1.1.22-0.rc1.9.8.i386.rpm
9f972e3d14de63a514b29911c076a105  cups-libs-1.1.22-0.rc1.9.8.ia64.rpm

ppc:
bccc62127d4c1e33142834b51ac6e7c6  cups-1.1.22-0.rc1.9.8.ppc.rpm
1079373b5ea215089fccf36ba70d0433  cups-devel-1.1.22-0.rc1.9.8.ppc.rpm
f24f8fd0f1fa276473e35c671e512ce5  cups-libs-1.1.22-0.rc1.9.8.ppc.rpm
41fa84f19c29ee41d63595ea52e7b3ce  cups-libs-1.1.22-0.rc1.9.8.ppc64.rpm

s390:
cecdea0d446b77dbc11d5c5e43945d0c  cups-1.1.22-0.rc1.9.8.s390.rpm
5e6980d33d608a40648492834305ded3  cups-devel-1.1.22-0.rc1.9.8.s390.rpm
aa0f6a45ca2189d303f7068c6355b852  cups-libs-1.1.22-0.rc1.9.8.s390.rpm

s390x:
f777882e9778218c1b9871dfa82d978e  cups-1.1.22-0.rc1.9.8.s390x.rpm
0e49a4f5ae14f11a9cffc08740bbcf5d  cups-devel-1.1.22-0.rc1.9.8.s390x.rpm
aa0f6a45ca2189d303f7068c6355b852  cups-libs-1.1.22-0.rc1.9.8.s390.rpm
f33f28d85e1578716669a57416dfaf32  cups-libs-1.1.22-0.rc1.9.8.s390x.rpm

x86_64:
0b7bb29ad9fa8cc9ebda7e137ecb907f  cups-1.1.22-0.rc1.9.8.x86_64.rpm
e31bd71eed98ea96c1edf43cbd2a4a37  cups-devel-1.1.22-0.rc1.9.8.x86_64.rpm
03eb88625ad7a9582fd65e1fdf85545c  cups-libs-1.1.22-0.rc1.9.8.i386.rpm
c85420148ee0e3f5795b7560104bd181  cups-libs-1.1.22-0.rc1.9.8.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/cups-1.1.22-0.rc1.9.8.src.rpm
3d3b43d382f9bc219c019e288a14a1ac  cups-1.1.22-0.rc1.9.8.src.rpm

i386:
652b9075cea217d7e745c5f6cec0a1d9  cups-1.1.22-0.rc1.9.8.i386.rpm
7d646622a93e6007e11b255397c26731  cups-devel-1.1.22-0.rc1.9.8.i386.rpm
03eb88625ad7a9582fd65e1fdf85545c  cups-libs-1.1.22-0.rc1.9.8.i386.rpm

x86_64:
0b7bb29ad9fa8cc9ebda7e137ecb907f  cups-1.1.22-0.rc1.9.8.x86_64.rpm
e31bd71eed98ea96c1edf43cbd2a4a37  cups-devel-1.1.22-0.rc1.9.8.x86_64.rpm
03eb88625ad7a9582fd65e1fdf85545c  cups-libs-1.1.22-0.rc1.9.8.i386.rpm
c85420148ee0e3f5795b7560104bd181  cups-libs-1.1.22-0.rc1.9.8.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/cups-1.1.22-0.rc1.9.8.src.rpm
3d3b43d382f9bc219c019e288a14a1ac  cups-1.1.22-0.rc1.9.8.src.rpm

i386:
652b9075cea217d7e745c5f6cec0a1d9  cups-1.1.22-0.rc1.9.8.i386.rpm
7d646622a93e6007e11b255397c26731  cups-devel-1.1.22-0.rc1.9.8.i386.rpm
03eb88625ad7a9582fd65e1fdf85545c  cups-libs-1.1.22-0.rc1.9.8.i386.rpm

ia64:
09c6943b6f4258e4f079e876a45bed89  cups-1.1.22-0.rc1.9.8.ia64.rpm
b2e6ef0a1cd30ba9222efc817bfc6fe6  cups-devel-1.1.22-0.rc1.9.8.ia64.rpm
03eb88625ad7a9582fd65e1fdf85545c  cups-libs-1.1.22-0.rc1.9.8.i386.rpm
9f972e3d14de63a514b29911c076a105  cups-libs-1.1.22-0.rc1.9.8.ia64.rpm

x86_64:
0b7bb29ad9fa8cc9ebda7e137ecb907f  cups-1.1.22-0.rc1.9.8.x86_64.rpm
e31bd71eed98ea96c1edf43cbd2a4a37  cups-devel-1.1.22-0.rc1.9.8.x86_64.rpm
03eb88625ad7a9582fd65e1fdf85545c  cups-libs-1.1.22-0.rc1.9.8.i386.rpm
c85420148ee0e3f5795b7560104bd181  cups-libs-1.1.22-0.rc1.9.8.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/cups-1.1.22-0.rc1.9.8.src.rpm
3d3b43d382f9bc219c019e288a14a1ac  cups-1.1.22-0.rc1.9.8.src.rpm

i386:
652b9075cea217d7e745c5f6cec0a1d9  cups-1.1.22-0.rc1.9.8.i386.rpm
7d646622a93e6007e11b255397c26731  cups-devel-1.1.22-0.rc1.9.8.i386.rpm
03eb88625ad7a9582fd65e1fdf85545c  cups-libs-1.1.22-0.rc1.9.8.i386.rpm

ia64:
09c6943b6f4258e4f079e876a45bed89  cups-1.1.22-0.rc1.9.8.ia64.rpm
b2e6ef0a1cd30ba9222efc817bfc6fe6  cups-devel-1.1.22-0.rc1.9.8.ia64.rpm
03eb88625ad7a9582fd65e1fdf85545c  cups-libs-1.1.22-0.rc1.9.8.i386.rpm
9f972e3d14de63a514b29911c076a105  cups-libs-1.1.22-0.rc1.9.8.ia64.rpm

x86_64:
0b7bb29ad9fa8cc9ebda7e137ecb907f  cups-1.1.22-0.rc1.9.8.x86_64.rpm
e31bd71eed98ea96c1edf43cbd2a4a37  cups-devel-1.1.22-0.rc1.9.8.x86_64.rpm
03eb88625ad7a9582fd65e1fdf85545c  cups-libs-1.1.22-0.rc1.9.8.i386.rpm
c85420148ee0e3f5795b7560104bd181  cups-libs-1.1.22-0.rc1.9.8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2874

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.