Debian: CUPS multiple vulnerabilities

    Date 18 Feb 2003
    Posted By LinuxSecurity Advisories
    Multiple vulnerabilities were discovered in the Common Unix Printing System (CUPS).
    Debian Security Advisory DSA 232-2                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    February 20th, 2003            
    Package        : cupsys
    Vulnerability  : several
    Problem-type   : remote
    Debian-specific: no
    CVE Id         : CAN-2002-1366 CAN-2002-1367 CAN-2002-1368 CAN-2002-1369 CAN-2002-1371 CAN-2002-1372 CAN-2002-1383 CAN-2002-1384
    This update corrects a library dependency for the libcupsys2 package
    which sneaked in with the last security update to CUPS for the stable
    distribution (woody).
    The original advisory DSA 232-1 stated:
       Multiple vulnerabilities were discovered in the Common Unix
       Printing System (CUPS).  Several of these issues represent the
       potential for a remote compromise or denial of service.  The Common
       Vulnerabilities and Exposures project identifies the problems
       listed above.
    Upgrade Instructions
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
      Source archives:
          Size/MD5 checksum:      690 488a4f8ea7203fadde75d906e6cf64ea
          Size/MD5 checksum:    35455 de07347fda86dad071c45e6d932c97f4
          Size/MD5 checksum:  6150756 0dfa41f29fa73e7744903b2471d2ca2f
      Alpha architecture:
          Size/MD5 checksum:  1899888 49dc42a554de6d65a87b6ae2e8ff9bc2
          Size/MD5 checksum:    73878 3f2a05f77006279df5a72a5e10f2567a
          Size/MD5 checksum:    92524 d7e288183671c27fa8fa09626d699380
          Size/MD5 checksum:  2445346 c317555525b3afae1f1900e48f73ccb6
          Size/MD5 checksum:   137394 c772d3cb006f8e44738b349e24a5984b
          Size/MD5 checksum:   180182 a70ad0d886b74710d3b4106aabe55184
      ARM architecture:
          Size/MD5 checksum:  1821374 a6674c57f31308872e20499b17357c37
          Size/MD5 checksum:    68006 ab978ff099fdd7b37550106971454059
          Size/MD5 checksum:    85210 48f3e5ba501e1b38a1634a047d61d636
          Size/MD5 checksum:  2345388 7a8ac6e933aa3824afea3a0a228bb0dc
          Size/MD5 checksum:   112332 0d8f215879b74847ed5acf8e7fe7fff4
          Size/MD5 checksum:   149736 b08a2c3bfae9b364969fee4521f8a601
      Intel IA-32 architecture:
          Size/MD5 checksum:  1788152 cc4758069a8aa1fa0e4958f131f0faa2
          Size/MD5 checksum:    67532 739cb994c54cd11154f13a99d36edffb
          Size/MD5 checksum:    83722 8f8fcd75c985a1e5f75d1170f21197c6
          Size/MD5 checksum:  2311516 09a23d49459ca3effd505921a2f8d434
          Size/MD5 checksum:   110408 86ece906e4f6bf1607758894a217c9bd
          Size/MD5 checksum:   135864 50e2bd585535a49a53f518178dedaa12
      Intel IA-64 architecture:
          Size/MD5 checksum:  2007920 a5789e5d38b90613aea9b5a458714b95
          Size/MD5 checksum:    76944 18f4cf8775b1bf950b7db673f6be26d2
          Size/MD5 checksum:    96686 10d076494a77ebda207b3f4ccbb4d2fb
          Size/MD5 checksum:  2656320 898d58fa392cf145466c7c035eeb0126
          Size/MD5 checksum:   155146 d472d99b98d3df5b9a88934fa1325449
          Size/MD5 checksum:   182086 f6b72a5972bddfa606e8369b1d6f4db0
      HP Precision architecture:
          Size/MD5 checksum:  1881350 c14a8d5cca984546202bff3b3a5cfbc8
          Size/MD5 checksum:    70332 737ad34c1337a351f850e5a09dd27173
          Size/MD5 checksum:    89344 894cd4fe76e427b09ba7e30288a69394
          Size/MD5 checksum:  2455558 56a4e578951ffbcf6c9c7be6234c5fb7
          Size/MD5 checksum:   126020 cfc0ba6b024a6bf627e2bc57aecf9dac
          Size/MD5 checksum:   158844 ac79946225c6f83d2fa5f88e6c5b4fba
      Motorola 680x0 architecture:
          Size/MD5 checksum:  1755098 3c27c579b91cf890a47b98917461267f
          Size/MD5 checksum:    65798 48b9c5e7cea3e4f9c72a45cd925347d8
          Size/MD5 checksum:    80918 3fbdf5ad323a27d7cb3bfe73176c4afc
          Size/MD5 checksum:  2260938 85a91950c1bff5d447b51b8162d30d01
          Size/MD5 checksum:   105630 b284987845a6eaa414f305756029a571
          Size/MD5 checksum:   128180 cf0c3ebf9d4b5c3b98079d1ca07f76d6
      Big endian MIPS architecture:
          Size/MD5 checksum:  1811460 8494a7da26a892605955b91e7aec2752
          Size/MD5 checksum:    67422 0146e8d156c0aa6b8813168e3d66feed
          Size/MD5 checksum:    80874 d097c0c61fc2e8f0904109d432a233ab
          Size/MD5 checksum:  2404196 41e947389ba9414f69a9c6cdbd5476a0
          Size/MD5 checksum:   112190 b51437fa6dedb0b7cc8178b550e3a95c
          Size/MD5 checksum:   150458 7007044bc2d13a922999ee4a0b2340fb
      Little endian MIPS architecture:
          Size/MD5 checksum:  1812312 9dbabaedf362d30cf0bfb8d5a6e1ac26
          Size/MD5 checksum:    67416 0569cbc30da536cbca2639f0d5d1dcfc
          Size/MD5 checksum:    80902 8a0b296db80627b629711c87334ca13a
          Size/MD5 checksum:  2406512 3857a4490fca8ab736d5466c5a282fce
          Size/MD5 checksum:   111910 119cb8711ce5c8d8198a5aa55047ea11
          Size/MD5 checksum:   150300 a82267043aff30d615e6412b1419920b
      PowerPC architecture:
          Size/MD5 checksum:  1800642 2e8e32a8ad80d6537bba0f53b5e5d614
          Size/MD5 checksum:    67434 330355b0de8fbe9942c3b45c86b8833b
          Size/MD5 checksum:    83012 eb02960a180f9a7b2c20f3acd30b8ac4
          Size/MD5 checksum:  2359336 e106d470424730249bd78e3627cd982e
          Size/MD5 checksum:   116116 15ec4592d5d69df82ef0bfc13af38470
          Size/MD5 checksum:   144438 6e07739403598c1fa4e547384027749e
      IBM S/390 architecture:
          Size/MD5 checksum:  1795128 6d8293268c3b69e44c4b4fef02cdd41f
          Size/MD5 checksum:    68818 a945b56e02744f098ae98a8b529d9e13
          Size/MD5 checksum:    85552 6569bf59c17d3bde8d723fd441060b5f
          Size/MD5 checksum:  2337158 444e722e99e0207ba45a4a2782372492
          Size/MD5 checksum:   114702 766c671a3e0380d5ea79bd8908f222c4
          Size/MD5 checksum:   140224 4706d66dd339c0bee9429c710053a86d
      Sun Sparc architecture:
          Size/MD5 checksum:  1844716 3148ba840c107efb91e9ae7ec472b38a
          Size/MD5 checksum:    70380 43573608b4c8b2194eba8320d84a676d
          Size/MD5 checksum:    83818 f2d12acc706621476f04b03e31f47bc6
          Size/MD5 checksum:  2354226 07c0e47816a4abcc6b4798a75245f805
          Size/MD5 checksum:   119844 36e6cdfa8ba20a339118184ec2a9e04e
          Size/MD5 checksum:   146012 08ec4db24b3e696f4be77f56c9705eb7
      These files will probably be moved into the stable distribution on
      its next revision.
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and

    LinuxSecurity Poll

    How do you feel about the elimination of the terms 'blacklist' and 'slave' from the Linux kernel?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"112","title":"I strongly support this change - racially charged language should not be used in the code and documentation of the kernel and other open-source projects.","votes":"3","type":"x","order":"1","pct":42.86,"resources":[]},{"id":"113","title":"I'm indifferent - this small change will not affect broader issues of racial insensitivity and white privilege.","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"114","title":"I'm opposed to this change - there is no need to change language that has been used for years. It doesn't make sense for people to take offense to terminology used in community projects.","votes":"2","type":"x","order":"3","pct":28.57,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.