Debian: New CUPS packages fix arbitrary code execution

    Date27 Jan 2006
    CategoryDebian
    3493
    Posted ByJoe Shakespeare
    "infamous41md" and Chris Evans discovered several heap based buffer overflows in xpdf which are also present in CUPS, the Common UNIX Printing System, and which can lead to a denial of service by crashing the application or possibly to the execution of arbitrary code.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 950-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                             Martin Schulze
    January 23rd, 2006                      http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : cupsys
    Vulnerability  : buffer overflows
    Problem type   : remote
    Debian-specific: no
    CVE IDs        : CVE-2005-3191 CVE-2005-3192 CVE-2005-3193 CVE-2005-3624
                     CVE-2005-3625 CVE-2005-3626 CVE-2005-3627 CVE-2005-3628
    
    "infamous41md" and Chris Evans discovered several heap based buffer
    overflows in xpdf which are also present in CUPS, the Common UNIX
    Printing System, and which can lead to a denial of service by crashing
    the application or possibly to the execution of arbitrary code.
    
    For the old stable distribution (woody) these problems have been fixed in
    version 1.1.14-5woody14.
    
    For the stable distribution (sarge) these problems have been fixed in
    version 1.1.23-10sarge1.
    
    For the unstable distribution (sid) these problems will be fixed soon.
    
    We recommend that you upgrade your CUPS packages.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14.dsc
          Size/MD5 checksum:      712 87055bd9647d440b8ce56afc1c53c062
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14.diff.gz
          Size/MD5 checksum:    41961 2d996ab8926c30dda9b4b1da5db2dcf5
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14.orig.tar.gz
          Size/MD5 checksum:  6150756 0dfa41f29fa73e7744903b2471d2ca2f
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_alpha.deb
          Size/MD5 checksum:  1901460 d9c2716ed4e3eb17551e93bd09ef3cb1
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_alpha.deb
          Size/MD5 checksum:    74640 ecc0016c60f37d7b99c4d8848588a4d1
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_alpha.deb
          Size/MD5 checksum:    93286 9f018be9b70c2dc86ee7d022b92ff102
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_alpha.deb
          Size/MD5 checksum:  2446114 c097158954ffc328f578dea763337440
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_alpha.deb
          Size/MD5 checksum:   138306 3d938cc09f9b17c65c79a4b7c4c7474a
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_alpha.deb
          Size/MD5 checksum:   181258 db9cc1c0273d516386ccf2be873166a0
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_arm.deb
          Size/MD5 checksum:  1822154 a6c2a7bc9ed9a2daf492474dfbfee387
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_arm.deb
          Size/MD5 checksum:    68790 a6504ee333ddb3bea747835678a025f3
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_arm.deb
          Size/MD5 checksum:    85976 20b1bc34eee904186892e47522024266
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_arm.deb
          Size/MD5 checksum:  2346140 ed23313e05032089bb5cee70cd914711
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_arm.deb
          Size/MD5 checksum:   113304 9ffcce59eb3f9b306dbd661fe9b28760
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_arm.deb
          Size/MD5 checksum:   150704 be20a14dfa2fb2251d9a046159a4ac9e
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_i386.deb
          Size/MD5 checksum:  1788452 f920699db4f6756a27ef73c00d41cb1c
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_i386.deb
          Size/MD5 checksum:    68280 728e5ab852df891dbb094c877d5d26f2
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_i386.deb
          Size/MD5 checksum:    84416 352934f7cabf8e8835cbe685e136ab69
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_i386.deb
          Size/MD5 checksum:  2312294 656e02e4f86107449f528789393bf3d4
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_i386.deb
          Size/MD5 checksum:   111268 cdd8f173a676c42e1e6f800757777e44
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_i386.deb
          Size/MD5 checksum:   136824 3762ca0a2e9f04e82c69de42bee5c6d1
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_ia64.deb
          Size/MD5 checksum:  2009046 515a82e65816d7306a0eed23eb81eca7
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_ia64.deb
          Size/MD5 checksum:    77740 1934f438e856d54966bd86d1e575185c
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_ia64.deb
          Size/MD5 checksum:    97452 b74539e18af4838477d91c604d8a92ed
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_ia64.deb
          Size/MD5 checksum:  2657094 64e4f7fef054d690c03ca3753742a762
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_ia64.deb
          Size/MD5 checksum:   156328 82d9922dc92754c43bf39e8f4cc77928
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_ia64.deb
          Size/MD5 checksum:   183270 6a90afecd9464585d98e294ff73929c7
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_hppa.deb
          Size/MD5 checksum:  1882286 4ec8f0298dc7249fa9ca70017b324de2
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_hppa.deb
          Size/MD5 checksum:    71102 4fe9e3556038e7ad2a5f98b93293a37a
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_hppa.deb
          Size/MD5 checksum:    90130 eeb463655e9c4d920e9bd9bf6f59fc2e
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_hppa.deb
          Size/MD5 checksum:  2456368 06cd1008318bbb3508f78208360c25dd
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_hppa.deb
          Size/MD5 checksum:   126830 9438fad24f29a082acf3af12f1b78ba2
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_hppa.deb
          Size/MD5 checksum:   159848 992335895e6d5f9507cd5f261bab3083
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_m68k.deb
          Size/MD5 checksum:  1756060 ab11910eddafa259de3bd745b44bf3da
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_m68k.deb
          Size/MD5 checksum:    66570 e2c198da29470435c7728c04ec1dddcd
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_m68k.deb
          Size/MD5 checksum:    81710 aba951dcf7e9b48289d66d28b52a8fe1
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_m68k.deb
          Size/MD5 checksum:  2261686 aba414903aed1f525daddefc42d9cb0f
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_m68k.deb
          Size/MD5 checksum:   106548 52dd393183f425b3cfd7dfb424a83df8
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_m68k.deb
          Size/MD5 checksum:   129094 4348111e8d1be636745d7871e8891948
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_mips.deb
          Size/MD5 checksum:  1812104 dd3a152cc6f60aee92caf1b1d48be116
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_mips.deb
          Size/MD5 checksum:    68192 471231e45b6758318b09593584561492
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_mips.deb
          Size/MD5 checksum:    81620 20a54b310accf0c618ae17b1939928d6
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_mips.deb
          Size/MD5 checksum:  2404894 e5448e7a68d1b9b2faffe6250e293504
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_mips.deb
          Size/MD5 checksum:   113064 bef1f42d86e8f491fc3c01eab9d1978d
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_mips.deb
          Size/MD5 checksum:   151504 bea406cc6863a488054206378e8fb04c
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_mipsel.deb
          Size/MD5 checksum:  1812764 83e4dac89074dcb5adeeadc94e1b77fc
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_mipsel.deb
          Size/MD5 checksum:    68190 8a5f9228fd00e1f2010b4ecc3192043f
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_mipsel.deb
          Size/MD5 checksum:    81664 c7329620731adcafa54c76956c7570fa
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_mipsel.deb
          Size/MD5 checksum:  2407286 597914ee83c1d95f071f3f9cc2a712c4
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_mipsel.deb
          Size/MD5 checksum:   112850 b0ba6a07c9ae3dd1265428e591c46e97
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_mipsel.deb
          Size/MD5 checksum:   151320 08f9b0bd3e63b83e4486a736f4183c80
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_powerpc.deb
          Size/MD5 checksum:  1801230 7ae9ff1ad1a2b39bcac9caf0a1ea84bf
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_powerpc.deb
          Size/MD5 checksum:    68216 c4a5278ee7b0decab415799498ec4c0e
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_powerpc.deb
          Size/MD5 checksum:    83804 1f0e2917e7bbfa3c41b42a8706aa4dbc
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_powerpc.deb
          Size/MD5 checksum:  2360122 0205d9a7e7294b1c5df64b7b5aeef414
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_powerpc.deb
          Size/MD5 checksum:   117102 75a66b72bc9f3de5db50bab7c0fd877d
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_powerpc.deb
          Size/MD5 checksum:   145562 d77e1f716df37e1e1f4fa0408adaa2d7
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_s390.deb
          Size/MD5 checksum:  1796146 6fa046122e3b7f1c3d8d4b5d74ab4f44
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_s390.deb
          Size/MD5 checksum:    69592 f2f9bf8682b4cb7fc45daddff2643bf2
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_s390.deb
          Size/MD5 checksum:    86316 b48887446a27a55d25ac400c1aac22ce
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_s390.deb
          Size/MD5 checksum:  2337954 7a17b6c38961912f5c8ac1d3a93df115
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_s390.deb
          Size/MD5 checksum:   115630 c441bc67529c0ca9d65b2ecf7ae77a22
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_s390.deb
          Size/MD5 checksum:   141154 6c1045dab37cd0c2de8ea9521fb15ce5
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody14_sparc.deb
          Size/MD5 checksum:  1845976 02c8158a514550f09e71440b57bbe091
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody14_sparc.deb
          Size/MD5 checksum:    71162 e80f373008dae5e4c53f573cb8211742
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody14_sparc.deb
          Size/MD5 checksum:    84582 9a972b8f43a72a85b83deaca3fd33dd9
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody14_sparc.deb
          Size/MD5 checksum:  2354982 984c7d23e08833f26d1cd63e54292a41
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody14_sparc.deb
          Size/MD5 checksum:   120776 704f789385683f359cc6ed1328892516
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody14_sparc.deb
          Size/MD5 checksum:   147072 e9aabfc1246767e35667aeed061f0184
    
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1.dsc
          Size/MD5 checksum:      843 149c91767477b75a0cf7db28c6129b30
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1.diff.gz
          Size/MD5 checksum:  1273227 8e6fbc6b8ca8d4588d90312a3a7c2199
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23.orig.tar.gz
          Size/MD5 checksum: 10071818 d6995f493129e9637581f3a717c8345e
    
      Architecture independent components:
    
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.23-10sarge1_all.deb
          Size/MD5 checksum:      972 0f85b73fa4d13914cf8f50dc2dc1910f
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_alpha.deb
          Size/MD5 checksum:  8998558 547b44162becac3729e55a1efa9bf526
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_alpha.deb
          Size/MD5 checksum:    51964 4961aed776b96ad6201d56a9d2405a2f
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_alpha.deb
          Size/MD5 checksum:   116824 732753a8cfbd0eeb5f52b8686948f6b6
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_alpha.deb
          Size/MD5 checksum:    61186 e6dab465c327d8b5769a406130e47216
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_alpha.deb
          Size/MD5 checksum:    61054 d6261652e2a0cbb4d396411f224a0322
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_alpha.deb
          Size/MD5 checksum:   112100 28f6458e3a69ee997b3dee07b7c2b616
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_alpha.deb
          Size/MD5 checksum:    83694 433ccca31f21ee3d1b726acc36fe3350
    
      AMD64 architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_amd64.deb
          Size/MD5 checksum:  8965490 0ed3172129be9fac870f3c27c16d9b6b
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_amd64.deb
          Size/MD5 checksum:    48912 481fb3ff53dcea0ab7675e2935d0c4b5
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_amd64.deb
          Size/MD5 checksum:   111480 0d29c73380d005759e830a560765115b
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_amd64.deb
          Size/MD5 checksum:    54140 7aa240c5363d73169f72ced83b9418f9
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_amd64.deb
          Size/MD5 checksum:    45302 4bf1056c7dbfb8f8ca5418b2bd0da446
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_amd64.deb
          Size/MD5 checksum:    88114 31b7feb9363003f66f67f957e4933e9a
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_amd64.deb
          Size/MD5 checksum:    76420 b550d92e77c52790bf5a58031f605c8d
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_arm.deb
          Size/MD5 checksum:  8957012 915fdb81401cd63d854e5cf40605a797
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_arm.deb
          Size/MD5 checksum:    47944 7464b760910c7eec6450fb3608a54845
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_arm.deb
          Size/MD5 checksum:   108064 f6f2d9a1dbefa5bb4adfeec4592df8af
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_arm.deb
          Size/MD5 checksum:    52704 67a5ae9c5dcdf9a5a86f7d64292bf967
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_arm.deb
          Size/MD5 checksum:    47096 9fa5503ff99ecfb041243039362b3a2a
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_arm.deb
          Size/MD5 checksum:    88946 ecdf555d38255fd39a08ee1387013f1b
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_arm.deb
          Size/MD5 checksum:    70916 10e8a947858a4707236de9e2006e3907
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_i386.deb
          Size/MD5 checksum:  8956128 da71b0801cba48f1cb692d93297abc2b
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_i386.deb
          Size/MD5 checksum:    48344 41ebb63f63a0f2dae4312cb0618114fa
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_i386.deb
          Size/MD5 checksum:   109956 fbc4c77291e86a1ef4cbba36cfa54b7d
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_i386.deb
          Size/MD5 checksum:    54588 140f3a9b6f693b7d5cfc5666b1ca9811
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_i386.deb
          Size/MD5 checksum:    45896 45916eeaf110d91dfffd39ce25f0b36a
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_i386.deb
          Size/MD5 checksum:    86752 04ef904ec3d610eca55a8c4c27126dc5
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_i386.deb
          Size/MD5 checksum:    75220 f5dcffc2f6f71ccc85c939001d84a3b7
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_ia64.deb
          Size/MD5 checksum:  9097650 7833e9cdda700ca59e4ca74c68c8c94f
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_ia64.deb
          Size/MD5 checksum:    57190 05e645e5af8ea79fffe60985668f4d1a
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_ia64.deb
          Size/MD5 checksum:   131422 72e92715d0f7c044313dce896e32327d
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_ia64.deb
          Size/MD5 checksum:    68416 744165acbbe1ab96f53d8e4d91346367
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_ia64.deb
          Size/MD5 checksum:    59894 1d3e91c509a4e0f790b7abbbf379d623
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_ia64.deb
          Size/MD5 checksum:   112768 96f6ecd302463e5a401f52c3e060b498
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_ia64.deb
          Size/MD5 checksum:    97514 612eb7ff11d4f89e9c03224917586fa3
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_hppa.deb
          Size/MD5 checksum:  9010754 0c11b272d05a6f65c3665ac8b15b8947
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_hppa.deb
          Size/MD5 checksum:    52902 84620c8436668790219d44c1cf7373b4
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_hppa.deb
          Size/MD5 checksum:   117598 4c4500d88ed256ef352e59849cf8a286
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_hppa.deb
          Size/MD5 checksum:    59694 7917b68267148a9f0c82e55e4a759783
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_hppa.deb
          Size/MD5 checksum:    51240 2c078aa79136b3ace1c2d28b94da9256
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_hppa.deb
          Size/MD5 checksum:    95354 203442791f4f1d2ecd1e70e3279dbfd5
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_hppa.deb
          Size/MD5 checksum:    82904 bd10a9918c341f9614f68a3ee81683db
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_m68k.deb
          Size/MD5 checksum:  8925186 a926ab8492abf60434ffdadfb307b9e8
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_m68k.deb
          Size/MD5 checksum:    46966 6562751ea50409726f36af2016408821
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_m68k.deb
          Size/MD5 checksum:   104484 0318d6db604c936380a4fdfb3482eac8
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_m68k.deb
          Size/MD5 checksum:    49714 272c0080ae763db015e2199c39c72220
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_m68k.deb
          Size/MD5 checksum:    37408 3179193900762362145cd7b45e91cbf2
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_m68k.deb
          Size/MD5 checksum:    75744 f898ee020d7f540eafdabf95decc768f
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_m68k.deb
          Size/MD5 checksum:    70676 8882d7075c9cb16ee51ba2051c6e801c
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_mips.deb
          Size/MD5 checksum:  8994246 e0b394ae2fe5dd1bd72750cfad52de53
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_mips.deb
          Size/MD5 checksum:    54694 a3a93dad227e79d81be0f9db867afc6d
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_mips.deb
          Size/MD5 checksum:   121500 e41d68c6950a41cf7ce208a6ac0bc3de
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_mips.deb
          Size/MD5 checksum:    53986 b511a7cb6c46058ea49a621dcc3c4988
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_mips.deb
          Size/MD5 checksum:    48646 e54608c8ff507c59f73d6bf47f4f5b7e
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_mips.deb
          Size/MD5 checksum:    88824 3f494a70d277f0f7340860d9e9898fe6
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_mips.deb
          Size/MD5 checksum:    72820 67af0adb3c1e2ce71c4f3810c80c6338
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_mipsel.deb
          Size/MD5 checksum:  8995140 195358c1b1afbde4fc6c8335efaa4181
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_mipsel.deb
          Size/MD5 checksum:    54840 959fc8269f565b6a60b90ac6216da171
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_mipsel.deb
          Size/MD5 checksum:   121638 8102c77355666f900144bbbf06a6e737
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_mipsel.deb
          Size/MD5 checksum:    54148 31231eb300e28dd7b27acd92b6118e81
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_mipsel.deb
          Size/MD5 checksum:    48762 45222e32a7a0ae9de9882a73d6008342
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_mipsel.deb
          Size/MD5 checksum:    88954 41584ce383f4282195d63c627eaa724a
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_mipsel.deb
          Size/MD5 checksum:    72696 5d14ee7a81b0a0e083210b82ddca20c7
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_powerpc.deb
          Size/MD5 checksum:  8969934 4e344b217f6ef0a9c8e60358023b31ee
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_powerpc.deb
          Size/MD5 checksum:    53294 d37e799234391a7d8a7aea39feb77e17
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_powerpc.deb
          Size/MD5 checksum:   119228 77809235fdf58d3f061514fc0cd8a6d1
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_powerpc.deb
          Size/MD5 checksum:    56414 27ca9a1284d4d61c61d1f3cd8ec8ac2b
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_powerpc.deb
          Size/MD5 checksum:    44490 28e399b1d223a87154c0121b7d03d611
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_powerpc.deb
          Size/MD5 checksum:    87470 2568624e044d49e0941b8ad30871eb3b
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_powerpc.deb
          Size/MD5 checksum:    76432 56bf5eca39b58eaf2ed3979b30a327f0
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_s390.deb
          Size/MD5 checksum:  8970048 9cc28b376bc998fcb677d07560578af5
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_s390.deb
          Size/MD5 checksum:    49436 551d0048566181bac7df0649d07d5612
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_s390.deb
          Size/MD5 checksum:   110080 2e8273c064ed8274fcbefb76ba7e658d
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_s390.deb
          Size/MD5 checksum:    55788 92ca368281195401f5df2b49e739804d
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_s390.deb
          Size/MD5 checksum:    44886 5391354597b49101acd2c6a30dd3ab4b
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_s390.deb
          Size/MD5 checksum:    90062 222e90ed6137450d20d2cdd6b22987a4
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_s390.deb
          Size/MD5 checksum:    78542 c6da804896bc9fb88c39b0bb1c53ce26
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.23-10sarge1_sparc.deb
          Size/MD5 checksum:  8972432 c4ecce3bcfadaeda1503afe260d84b7f
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.23-10sarge1_sparc.deb
          Size/MD5 checksum:    47664 6d5c126bdc8ba8581b8e197468577934
        http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.23-10sarge1_sparc.deb
          Size/MD5 checksum:   108100 c0b006f4a79340275585150450e91f0b
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.1.23-10sarge1_sparc.deb
          Size/MD5 checksum:    54544 4e81501aee3e095dc6c0dcb44c1d15ce
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.1.23-10sarge1_sparc.deb
          Size/MD5 checksum:    46028 5ceccb76a01d1a1b0fba31d4d80539aa
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.23-10sarge1_sparc.deb
          Size/MD5 checksum:    86606 7444f4cf093195c09db2e53fe8f45636
        http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.1.23-10sarge1_sparc.deb
          Size/MD5 checksum:    74404 d30b3e52cb5948f869332d91eb89c850
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":62.5,"resources":[]},{"id":"88","title":"Should be more technical","votes":"2","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":12.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.