LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: November 21st, 2014
Linux Security Week: November 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: New CUPS packages fix arbitrary code execution Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian "infamous41md" and Chris Evans discovered several heap based buffer overflows in xpdf which are also present in CUPS, the Common UNIX Printing System, and which can lead to a denial of service by crashing the application or possibly to the execution of arbitrary code.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 950-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
January 23rd, 2006                      http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : cupsys
Vulnerability  : buffer overflows
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2005-3191 CVE-2005-3192 CVE-2005-3193 CVE-2005-3624
                 CVE-2005-3625 CVE-2005-3626 CVE-2005-3627 CVE-2005-3628

"infamous41md" and Chris Evans discovered several heap based buffer
overflows in xpdf which are also present in CUPS, the Common UNIX
Printing System, and which can lead to a denial of service by crashing
the application or possibly to the execution of arbitrary code.

For the old stable distribution (woody) these problems have been fixed in
version 1.1.14-5woody14.

For the stable distribution (sarge) these problems have been fixed in
version 1.1.23-10sarge1.

For the unstable distribution (sid) these problems will be fixed soon.

We recommend that you upgrade your CUPS packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14.dsc
      Size/MD5 checksum:      712 87055bd9647d440b8ce56afc1c53c062
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14.diff.gz
      Size/MD5 checksum:    41961 2d996ab8926c30dda9b4b1da5db2dcf5
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14.orig.tar.gz
      Size/MD5 checksum:  6150756 0dfa41f29fa73e7744903b2471d2ca2f

  Alpha architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_alpha.deb
      Size/MD5 checksum:  1901460 d9c2716ed4e3eb17551e93bd09ef3cb1
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_alpha.deb
      Size/MD5 checksum:    74640 ecc0016c60f37d7b99c4d8848588a4d1
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_alpha.deb
      Size/MD5 checksum:    93286 9f018be9b70c2dc86ee7d022b92ff102
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_alpha.deb
      Size/MD5 checksum:  2446114 c097158954ffc328f578dea763337440
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_alpha.deb
      Size/MD5 checksum:   138306 3d938cc09f9b17c65c79a4b7c4c7474a
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_alpha.deb
      Size/MD5 checksum:   181258 db9cc1c0273d516386ccf2be873166a0

  ARM architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_arm.deb
      Size/MD5 checksum:  1822154 a6c2a7bc9ed9a2daf492474dfbfee387
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_arm.deb
      Size/MD5 checksum:    68790 a6504ee333ddb3bea747835678a025f3
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_arm.deb
      Size/MD5 checksum:    85976 20b1bc34eee904186892e47522024266
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_arm.deb
      Size/MD5 checksum:  2346140 ed23313e05032089bb5cee70cd914711
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_arm.deb
      Size/MD5 checksum:   113304 9ffcce59eb3f9b306dbd661fe9b28760
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_arm.deb
      Size/MD5 checksum:   150704 be20a14dfa2fb2251d9a046159a4ac9e

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_i386.deb
      Size/MD5 checksum:  1788452 f920699db4f6756a27ef73c00d41cb1c
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_i386.deb
      Size/MD5 checksum:    68280 728e5ab852df891dbb094c877d5d26f2
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_i386.deb
      Size/MD5 checksum:    84416 352934f7cabf8e8835cbe685e136ab69
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_i386.deb
      Size/MD5 checksum:  2312294 656e02e4f86107449f528789393bf3d4
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_i386.deb
      Size/MD5 checksum:   111268 cdd8f173a676c42e1e6f800757777e44
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_i386.deb
      Size/MD5 checksum:   136824 3762ca0a2e9f04e82c69de42bee5c6d1

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_ia64.deb
      Size/MD5 checksum:  2009046 515a82e65816d7306a0eed23eb81eca7
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_ia64.deb
      Size/MD5 checksum:    77740 1934f438e856d54966bd86d1e575185c
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_ia64.deb
      Size/MD5 checksum:    97452 b74539e18af4838477d91c604d8a92ed
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_ia64.deb
      Size/MD5 checksum:  2657094 64e4f7fef054d690c03ca3753742a762
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_ia64.deb
      Size/MD5 checksum:   156328 82d9922dc92754c43bf39e8f4cc77928
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_ia64.deb
      Size/MD5 checksum:   183270 6a90afecd9464585d98e294ff73929c7

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_hppa.deb
      Size/MD5 checksum:  1882286 4ec8f0298dc7249fa9ca70017b324de2
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_hppa.deb
      Size/MD5 checksum:    71102 4fe9e3556038e7ad2a5f98b93293a37a
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_hppa.deb
      Size/MD5 checksum:    90130 eeb463655e9c4d920e9bd9bf6f59fc2e
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_hppa.deb
      Size/MD5 checksum:  2456368 06cd1008318bbb3508f78208360c25dd
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_hppa.deb
      Size/MD5 checksum:   126830 9438fad24f29a082acf3af12f1b78ba2
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_hppa.deb
      Size/MD5 checksum:   159848 992335895e6d5f9507cd5f261bab3083

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_m68k.deb
      Size/MD5 checksum:  1756060 ab11910eddafa259de3bd745b44bf3da
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_m68k.deb
      Size/MD5 checksum:    66570 e2c198da29470435c7728c04ec1dddcd
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_m68k.deb
      Size/MD5 checksum:    81710 aba951dcf7e9b48289d66d28b52a8fe1
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_m68k.deb
      Size/MD5 checksum:  2261686 aba414903aed1f525daddefc42d9cb0f
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_m68k.deb
      Size/MD5 checksum:   106548 52dd393183f425b3cfd7dfb424a83df8
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_m68k.deb
      Size/MD5 checksum:   129094 4348111e8d1be636745d7871e8891948

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_mips.deb
      Size/MD5 checksum:  1812104 dd3a152cc6f60aee92caf1b1d48be116
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_mips.deb
      Size/MD5 checksum:    68192 471231e45b6758318b09593584561492
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_mips.deb
      Size/MD5 checksum:    81620 20a54b310accf0c618ae17b1939928d6
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_mips.deb
      Size/MD5 checksum:  2404894 e5448e7a68d1b9b2faffe6250e293504
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_mips.deb
      Size/MD5 checksum:   113064 bef1f42d86e8f491fc3c01eab9d1978d
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_mips.deb
      Size/MD5 checksum:   151504 bea406cc6863a488054206378e8fb04c

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_mipsel.deb
      Size/MD5 checksum:  1812764 83e4dac89074dcb5adeeadc94e1b77fc
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_mipsel.deb
      Size/MD5 checksum:    68190 8a5f9228fd00e1f2010b4ecc3192043f
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_mipsel.deb
      Size/MD5 checksum:    81664 c7329620731adcafa54c76956c7570fa
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_mipsel.deb
      Size/MD5 checksum:  2407286 597914ee83c1d95f071f3f9cc2a712c4
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_mipsel.deb
      Size/MD5 checksum:   112850 b0ba6a07c9ae3dd1265428e591c46e97
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_mipsel.deb
      Size/MD5 checksum:   151320 08f9b0bd3e63b83e4486a736f4183c80

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_powerpc.deb
      Size/MD5 checksum:  1801230 7ae9ff1ad1a2b39bcac9caf0a1ea84bf
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_powerpc.deb
      Size/MD5 checksum:    68216 c4a5278ee7b0decab415799498ec4c0e
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_powerpc.deb
      Size/MD5 checksum:    83804 1f0e2917e7bbfa3c41b42a8706aa4dbc
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_powerpc.deb
      Size/MD5 checksum:  2360122 0205d9a7e7294b1c5df64b7b5aeef414
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_powerpc.deb
      Size/MD5 checksum:   117102 75a66b72bc9f3de5db50bab7c0fd877d
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_powerpc.deb
      Size/MD5 checksum:   145562 d77e1f716df37e1e1f4fa0408adaa2d7

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_s390.deb
      Size/MD5 checksum:  1796146 6fa046122e3b7f1c3d8d4b5d74ab4f44
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_s390.deb
      Size/MD5 checksum:    69592 f2f9bf8682b4cb7fc45daddff2643bf2
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_s390.deb
      Size/MD5 checksum:    86316 b48887446a27a55d25ac400c1aac22ce
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_s390.deb
      Size/MD5 checksum:  2337954 7a17b6c38961912f5c8ac1d3a93df115
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_s390.deb
      Size/MD5 checksum:   115630 c441bc67529c0ca9d65b2ecf7ae77a22
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_s390.deb
      Size/MD5 checksum:   141154 6c1045dab37cd0c2de8ea9521fb15ce5

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_sparc.deb
      Size/MD5 checksum:  1845976 02c8158a514550f09e71440b57bbe091
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_sparc.deb
      Size/MD5 checksum:    71162 e80f373008dae5e4c53f573cb8211742
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_sparc.deb
      Size/MD5 checksum:    84582 9a972b8f43a72a85b83deaca3fd33dd9
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_sparc.deb
      Size/MD5 checksum:  2354982 984c7d23e08833f26d1cd63e54292a41
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_sparc.deb
      Size/MD5 checksum:   120776 704f789385683f359cc6ed1328892516
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_sparc.deb
      Size/MD5 checksum:   147072 e9aabfc1246767e35667aeed061f0184


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1.dsc
      Size/MD5 checksum:      843 149c91767477b75a0cf7db28c6129b30
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1.diff.gz
      Size/MD5 checksum:  1273227 8e6fbc6b8ca8d4588d90312a3a7c2199
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23.orig.tar.gz
      Size/MD5 checksum: 10071818 d6995f493129e9637581f3a717c8345e

  Architecture independent components:

    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.23-10sarge1_all.deb
      Size/MD5 checksum:      972 0f85b73fa4d13914cf8f50dc2dc1910f

  Alpha architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_alpha.deb
      Size/MD5 checksum:  8998558 547b44162becac3729e55a1efa9bf526
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_alpha.deb
      Size/MD5 checksum:    51964 4961aed776b96ad6201d56a9d2405a2f
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_alpha.deb
      Size/MD5 checksum:   116824 732753a8cfbd0eeb5f52b8686948f6b6
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_alpha.deb
      Size/MD5 checksum:    61186 e6dab465c327d8b5769a406130e47216
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_alpha.deb
      Size/MD5 checksum:    61054 d6261652e2a0cbb4d396411f224a0322
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_alpha.deb
      Size/MD5 checksum:   112100 28f6458e3a69ee997b3dee07b7c2b616
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_alpha.deb
      Size/MD5 checksum:    83694 433ccca31f21ee3d1b726acc36fe3350

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_amd64.deb
      Size/MD5 checksum:  8965490 0ed3172129be9fac870f3c27c16d9b6b
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_amd64.deb
      Size/MD5 checksum:    48912 481fb3ff53dcea0ab7675e2935d0c4b5
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_amd64.deb
      Size/MD5 checksum:   111480 0d29c73380d005759e830a560765115b
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_amd64.deb
      Size/MD5 checksum:    54140 7aa240c5363d73169f72ced83b9418f9
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_amd64.deb
      Size/MD5 checksum:    45302 4bf1056c7dbfb8f8ca5418b2bd0da446
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_amd64.deb
      Size/MD5 checksum:    88114 31b7feb9363003f66f67f957e4933e9a
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_amd64.deb
      Size/MD5 checksum:    76420 b550d92e77c52790bf5a58031f605c8d

  ARM architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_arm.deb
      Size/MD5 checksum:  8957012 915fdb81401cd63d854e5cf40605a797
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_arm.deb
      Size/MD5 checksum:    47944 7464b760910c7eec6450fb3608a54845
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_arm.deb
      Size/MD5 checksum:   108064 f6f2d9a1dbefa5bb4adfeec4592df8af
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_arm.deb
      Size/MD5 checksum:    52704 67a5ae9c5dcdf9a5a86f7d64292bf967
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_arm.deb
      Size/MD5 checksum:    47096 9fa5503ff99ecfb041243039362b3a2a
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_arm.deb
      Size/MD5 checksum:    88946 ecdf555d38255fd39a08ee1387013f1b
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_arm.deb
      Size/MD5 checksum:    70916 10e8a947858a4707236de9e2006e3907

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_i386.deb
      Size/MD5 checksum:  8956128 da71b0801cba48f1cb692d93297abc2b
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_i386.deb
      Size/MD5 checksum:    48344 41ebb63f63a0f2dae4312cb0618114fa
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_i386.deb
      Size/MD5 checksum:   109956 fbc4c77291e86a1ef4cbba36cfa54b7d
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_i386.deb
      Size/MD5 checksum:    54588 140f3a9b6f693b7d5cfc5666b1ca9811
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_i386.deb
      Size/MD5 checksum:    45896 45916eeaf110d91dfffd39ce25f0b36a
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_i386.deb
      Size/MD5 checksum:    86752 04ef904ec3d610eca55a8c4c27126dc5
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_i386.deb
      Size/MD5 checksum:    75220 f5dcffc2f6f71ccc85c939001d84a3b7

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_ia64.deb
      Size/MD5 checksum:  9097650 7833e9cdda700ca59e4ca74c68c8c94f
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_ia64.deb
      Size/MD5 checksum:    57190 05e645e5af8ea79fffe60985668f4d1a
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_ia64.deb
      Size/MD5 checksum:   131422 72e92715d0f7c044313dce896e32327d
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_ia64.deb
      Size/MD5 checksum:    68416 744165acbbe1ab96f53d8e4d91346367
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_ia64.deb
      Size/MD5 checksum:    59894 1d3e91c509a4e0f790b7abbbf379d623
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_ia64.deb
      Size/MD5 checksum:   112768 96f6ecd302463e5a401f52c3e060b498
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_ia64.deb
      Size/MD5 checksum:    97514 612eb7ff11d4f89e9c03224917586fa3

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_hppa.deb
      Size/MD5 checksum:  9010754 0c11b272d05a6f65c3665ac8b15b8947
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_hppa.deb
      Size/MD5 checksum:    52902 84620c8436668790219d44c1cf7373b4
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_hppa.deb
      Size/MD5 checksum:   117598 4c4500d88ed256ef352e59849cf8a286
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_hppa.deb
      Size/MD5 checksum:    59694 7917b68267148a9f0c82e55e4a759783
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_hppa.deb
      Size/MD5 checksum:    51240 2c078aa79136b3ace1c2d28b94da9256
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_hppa.deb
      Size/MD5 checksum:    95354 203442791f4f1d2ecd1e70e3279dbfd5
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_hppa.deb
      Size/MD5 checksum:    82904 bd10a9918c341f9614f68a3ee81683db

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_m68k.deb
      Size/MD5 checksum:  8925186 a926ab8492abf60434ffdadfb307b9e8
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_m68k.deb
      Size/MD5 checksum:    46966 6562751ea50409726f36af2016408821
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_m68k.deb
      Size/MD5 checksum:   104484 0318d6db604c936380a4fdfb3482eac8
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_m68k.deb
      Size/MD5 checksum:    49714 272c0080ae763db015e2199c39c72220
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_m68k.deb
      Size/MD5 checksum:    37408 3179193900762362145cd7b45e91cbf2
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_m68k.deb
      Size/MD5 checksum:    75744 f898ee020d7f540eafdabf95decc768f
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_m68k.deb
      Size/MD5 checksum:    70676 8882d7075c9cb16ee51ba2051c6e801c

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_mips.deb
      Size/MD5 checksum:  8994246 e0b394ae2fe5dd1bd72750cfad52de53
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_mips.deb
      Size/MD5 checksum:    54694 a3a93dad227e79d81be0f9db867afc6d
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_mips.deb
      Size/MD5 checksum:   121500 e41d68c6950a41cf7ce208a6ac0bc3de
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_mips.deb
      Size/MD5 checksum:    53986 b511a7cb6c46058ea49a621dcc3c4988
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_mips.deb
      Size/MD5 checksum:    48646 e54608c8ff507c59f73d6bf47f4f5b7e
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_mips.deb
      Size/MD5 checksum:    88824 3f494a70d277f0f7340860d9e9898fe6
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_mips.deb
      Size/MD5 checksum:    72820 67af0adb3c1e2ce71c4f3810c80c6338

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_mipsel.deb
      Size/MD5 checksum:  8995140 195358c1b1afbde4fc6c8335efaa4181
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_mipsel.deb
      Size/MD5 checksum:    54840 959fc8269f565b6a60b90ac6216da171
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_mipsel.deb
      Size/MD5 checksum:   121638 8102c77355666f900144bbbf06a6e737
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_mipsel.deb
      Size/MD5 checksum:    54148 31231eb300e28dd7b27acd92b6118e81
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_mipsel.deb
      Size/MD5 checksum:    48762 45222e32a7a0ae9de9882a73d6008342
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_mipsel.deb
      Size/MD5 checksum:    88954 41584ce383f4282195d63c627eaa724a
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_mipsel.deb
      Size/MD5 checksum:    72696 5d14ee7a81b0a0e083210b82ddca20c7

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_powerpc.deb
      Size/MD5 checksum:  8969934 4e344b217f6ef0a9c8e60358023b31ee
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_powerpc.deb
      Size/MD5 checksum:    53294 d37e799234391a7d8a7aea39feb77e17
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_powerpc.deb
      Size/MD5 checksum:   119228 77809235fdf58d3f061514fc0cd8a6d1
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_powerpc.deb
      Size/MD5 checksum:    56414 27ca9a1284d4d61c61d1f3cd8ec8ac2b
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_powerpc.deb
      Size/MD5 checksum:    44490 28e399b1d223a87154c0121b7d03d611
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_powerpc.deb
      Size/MD5 checksum:    87470 2568624e044d49e0941b8ad30871eb3b
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_powerpc.deb
      Size/MD5 checksum:    76432 56bf5eca39b58eaf2ed3979b30a327f0

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_s390.deb
      Size/MD5 checksum:  8970048 9cc28b376bc998fcb677d07560578af5
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_s390.deb
      Size/MD5 checksum:    49436 551d0048566181bac7df0649d07d5612
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_s390.deb
      Size/MD5 checksum:   110080 2e8273c064ed8274fcbefb76ba7e658d
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_s390.deb
      Size/MD5 checksum:    55788 92ca368281195401f5df2b49e739804d
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_s390.deb
      Size/MD5 checksum:    44886 5391354597b49101acd2c6a30dd3ab4b
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_s390.deb
      Size/MD5 checksum:    90062 222e90ed6137450d20d2cdd6b22987a4
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_s390.deb
      Size/MD5 checksum:    78542 c6da804896bc9fb88c39b0bb1c53ce26

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_sparc.deb
      Size/MD5 checksum:  8972432 c4ecce3bcfadaeda1503afe260d84b7f
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_sparc.deb
      Size/MD5 checksum:    47664 6d5c126bdc8ba8581b8e197468577934
    http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_sparc.deb
      Size/MD5 checksum:   108100 c0b006f4a79340275585150450e91f0b
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_sparc.deb
      Size/MD5 checksum:    54544 4e81501aee3e095dc6c0dcb44c1d15ce
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_sparc.deb
      Size/MD5 checksum:    46028 5ceccb76a01d1a1b0fba31d4d80539aa
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_sparc.deb
      Size/MD5 checksum:    86606 7444f4cf093195c09db2e53fe8f45636
    http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_sparc.deb
      Size/MD5 checksum:    74404 d30b3e52cb5948f869332d91eb89c850


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
Google Releases Open Source Tool for Testing Web App Security Scanners
Most Targeted Attacks Exploit Privileged Accounts
NotCompable sets new standards for mobile botnet sophistication
Hands on with Caine Linux: Pentesting and UEFI compatible
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.