Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Mandriva: Updated cups packages fix vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Alin Rad Pop of Secunia Research discovered a vulnerability in CUPS that can be exploited by malicious individuals to execute arbitrary code. This flaw is due to a boundary error when processing IPP (Internet Printing Protocol) tags.
 Mandriva Linux Security Advisory                       MDKSA-2007:204-1
 Package : cups
 Date    : November 12, 2007
 Affected: 2008.0
 Problem Description:
 Alin Rad Pop of Secunia Research discovered a vulnerability in CUPS
 that can be exploited by malicious individuals to execute arbitrary
 code.  This flaw is due to a boundary error when processing IPP
 (Internet Printing Protocol) tags.


 Due to incorrect build requirements/conflicts, the cups-config
 in Mandriva Linux 2008.0 was displaying the full CFLAGS and libs
 instead of just the libraries when 'cups-config --libs' was invoked.
 This update corrects the cups-config behaviour.

 Updated Packages:
 Mandriva Linux 2008.0:
 066d0553d0d41408d9f0b0d89b9299de  2008.0/i586/cups-1.3.0-3.2mdv2008.0.i586.rpm
 761125ca708cd22b2360e84f36674051  2008.0/i586/cups-common-1.3.0-3.2mdv2008.0.i586.rpm
 24a6797ad61c1ee82710480cba57c912  2008.0/i586/cups-serial-1.3.0-3.2mdv2008.0.i586.rpm
 2c6d558345461a1813ea8ffa9b93be4e  2008.0/i586/libcups2-1.3.0-3.2mdv2008.0.i586.rpm
 30bd123775b39ffd80e94d3232dbd5ce  2008.0/i586/libcups2-devel-1.3.0-3.2mdv2008.0.i586.rpm
 1d147d09513abcb5e556a02dcb4272aa  2008.0/i586/php-cups-1.3.0-3.2mdv2008.0.i586.rpm 
 cfcb64cb2bc0af7b05c3770138a9311c  2008.0/SRPMS/cups-1.3.0-3.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 617534198402457ccce075bfc8341a2d  2008.0/x86_64/cups-1.3.0-3.2mdv2008.0.x86_64.rpm
 d7f56b65a853c2030ee85a5b9db1b800  2008.0/x86_64/cups-common-1.3.0-3.2mdv2008.0.x86_64.rpm
 48c4cd42cd19179ffeb003e1fed91f62  2008.0/x86_64/cups-serial-1.3.0-3.2mdv2008.0.x86_64.rpm
 2760af902f9937b89dfb836a07b373b2  2008.0/x86_64/lib64cups2-1.3.0-3.2mdv2008.0.x86_64.rpm
 a9cb35f7fa4cf7b55ef5730690b04aff  2008.0/x86_64/lib64cups2-devel-1.3.0-3.2mdv2008.0.x86_64.rpm
 7de4fe03981dbf79b9324e6e3fe244e4  2008.0/x86_64/php-cups-1.3.0-3.2mdv2008.0.x86_64.rpm 
 cfcb64cb2bc0af7b05c3770138a9311c  2008.0/SRPMS/cups-1.3.0-3.2mdv2008.0.src.rpm

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver 0x22458A98

 You can view other update advisories for Mandriva Linux at:

 If you want to report vulnerabilities, please contact


 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Feds Charged With Stealing Money During Silk Road Investigation
EFF questions US government's software flaw disclosure policy
Hotel Router Vulnerability A Reminder Of Untrusted WiFi Risks
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.