Debian: New cupsys packages fix several vulnerabilities

    Date 20 Oct 2008
    Posted By LinuxSecurity Advisories
    It was discovered that insufficient bounds checking in the SGI image filter may lead to the execution of arbitrary code.
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1656-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                       Moritz Muehlenhoff
    October 20, 2008            
    - ------------------------------------------------------------------------
    Package        : cupsys
    Vulnerability  : several
    Problem type   : local(remote)
    Debian-specific: no
    CVE Id(s)      : CVE-2008-3639 CVE-2008-3640 CVE-2008-3641
    Several local vulnerabilities have been discovered in the Common UNIX
    Printing System. The Common Vulnerabilities and Exposures project
    identifies the following problems:
        It was discovered that insufficient bounds checking in the SGI
        image filter may lead to the execution of arbitrary code.
        It was discovered that an integer overflow in the Postscript
        conversion tool "texttops" may lead to the execution of arbitrary
        It was discovered that insufficient bounds checking in the HPGL
        filter may lead to the execution of arbitrary code.
    For the stable distribution (etch), these problems have been fixed in
    version 1.2.7-4etch5.
    For the unstable distribution (sid) and the upcoming stable distribution
    (lenny), these problems have been fixed in version 1.3.8-1lenny2 of
    the source package cups.
    We recommend that you upgrade your cupsys package.
    Upgrade instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    Source archives:
        Size/MD5 checksum:  4214272 c9ba33356e5bb93efbcf77b6e142e498
        Size/MD5 checksum:   108662 eab5aa097eaf3e802b4c6f1c60da9a03
        Size/MD5 checksum:     1084 5fc7ea9d5c6434a9f2a45e3d7652b0fe
    Architecture independent packages:
        Size/MD5 checksum:   893832 0e7571a4a56cef8f099ba9300ed7330d
        Size/MD5 checksum:    46072 63a75f9fe31312a42725a786164f7762
    alpha architecture (DEC Alpha)
        Size/MD5 checksum:    39310 8dad5588b86a4e1191025015d8e0c5be
        Size/MD5 checksum:  1092376 35c1cd14d3f26fefafbebf1a76983740
        Size/MD5 checksum:    85906 1d07dcf128e7b78992560b2794be29d4
        Size/MD5 checksum:   183726 06377f48f1ee358c494f30f9ab213e6b
        Size/MD5 checksum:  1614540 e87b439635e9b7f7c1fa1c6db2f7291c
        Size/MD5 checksum:    95570 8638b199a8adb989254cbe88ab11bb7d
        Size/MD5 checksum:   175262 08dbbe7e941af9c28f39107f907c618a
        Size/MD5 checksum:    72690 1c099120f9fdcb334d8699b6238c0883
    amd64 architecture (AMD x86_64 (AMD64))
        Size/MD5 checksum:   142538 4f9183a690ac21a220771db117b1bcea
        Size/MD5 checksum:   162520 f04bafe61b0e06d21b67441916a4df2a
        Size/MD5 checksum:    36356 eea9b0c14ac248313264474f4a103478
        Size/MD5 checksum:    53022 f864e06d82bd0769e7c73d20aa6c3366
        Size/MD5 checksum:    80708 9e8a7d08f6762753005bc2ac7ac04db7
        Size/MD5 checksum:    86264 3784680669a08745d6c766213e3d60f3
        Size/MD5 checksum:  1576062 c5f275763d3cd0bec5e448965780ea0b
        Size/MD5 checksum:  1088040 106654a5c5a746e5bd1043ca4309deae
    arm architecture (ARM)
        Size/MD5 checksum:   132042 b1da3e68e04c68712a7f2ecebbea59d3
        Size/MD5 checksum:  1026238 e776ce47912d97de7758029cddf18c41
        Size/MD5 checksum:   155174 2203ae0043e540bb4c083c3f302294a9
        Size/MD5 checksum:    78908 a60d8486ab41fe7064d84fdf1c057ce5
        Size/MD5 checksum:    48742 9c6f61fb9c5af3f1496c249eb79542ce
        Size/MD5 checksum:  1569620 943fdc257cdf387c1a161adff88623bd
        Size/MD5 checksum:    85468 3e9d699071d741d86c5e2fbcc91a5241
        Size/MD5 checksum:    35940 0bb609f5c990c932c0fed843bb659062
    hppa architecture (HP PA RISC)
        Size/MD5 checksum:    84800 df6569c3eaad919b7f7768a75277838f
        Size/MD5 checksum:    91988 08040e0dcc8cc99298d40aa370be50cc
        Size/MD5 checksum:  1624214 e5d55a0aeacee0d85d7899018725b3d3
        Size/MD5 checksum:   153956 e11bfd3cb812f0892238a676a3453967
        Size/MD5 checksum:   171790 5b483d2f739ed456d94cf28047b2b2f5
        Size/MD5 checksum:    39548 181a14e58af274287bf02f8a758b70b5
        Size/MD5 checksum:    57398 715a6f4bb1b68b8a384a85ac384de668
        Size/MD5 checksum:  1032836 e1d9158ff6134678b976331566db0076
    i386 architecture (Intel ia32)
        Size/MD5 checksum:   999302 2ccf6ae0ef6f3d3dd56e484ba2199313
        Size/MD5 checksum:   160638 f22f7da23cd3dea82d49cc9900d62512
        Size/MD5 checksum:   138276 392028f61da2c29dcab1ffe3b4fe072f
        Size/MD5 checksum:  1548856 e1e04e47f556586eb83aff005d4870d2
        Size/MD5 checksum:    36474 9bea3cd926f04da508b6a714f0a1daac
        Size/MD5 checksum:    86776 f3188eafaa1bd01a7b92d9403aab03a1
        Size/MD5 checksum:    79878 ba1ed2b707101da54b3990b33ee1d877
        Size/MD5 checksum:    53276 346cdebc7980089b28610ceb30f65519
    ia64 architecture (Intel ia64)
        Size/MD5 checksum:   106226 829b2e5f435c8fb5eee03513654ee12f
        Size/MD5 checksum:   106998 08fcec24b8c165542d986a1fd174ddd3
        Size/MD5 checksum:    46336 32d29b5c2986070f5d5b909864952dc3
        Size/MD5 checksum:  1771030 e7b261b4627ee20a3083a4f18a382e24
        Size/MD5 checksum:   192370 576e218a37e677170e9201946f24da5a
        Size/MD5 checksum:  1108310 bdee8fbcfd10ba2847ab81ced8e9cc73
        Size/MD5 checksum:   204232 d5eb2138a8584813643dfe4e39d2fefb
        Size/MD5 checksum:    74224 846a87584f78285569aee9c037b677d9
    mipsel architecture (MIPS (Little Endian))
        Size/MD5 checksum:   158560 74bc73b9eb3c7494ce762f7beb9ab4cd
        Size/MD5 checksum:  1553460 cd35f3de34290840be09b1b10729d7b3
        Size/MD5 checksum:   150900 150e5405933cef2a8cf9147d88c9a4fb
        Size/MD5 checksum:    57860 2b7cdd4399e2893d2df0b5568d766239
        Size/MD5 checksum:    86996 d4776eace76cb37f72557a44d053a677
        Size/MD5 checksum:  1085494 429194a44228d669ecfa2acdeadf55e6
        Size/MD5 checksum:    36058 f28b3f705fd293fc82a256d571119452
        Size/MD5 checksum:    77448 4a9be71b3fc25253b1e77c2594e7f508
    powerpc architecture (PowerPC)
        Size/MD5 checksum:    51880 d1b872415002b54aba1ef54833cd5564
        Size/MD5 checksum:    90008 fe2be6aba034693532a01b653781f501
        Size/MD5 checksum:  1576600 d954a84710f9671d34eca72922f8d1d8
        Size/MD5 checksum:   136868 ee633edb72a9d6d74481d9fe17d887d5
        Size/MD5 checksum:  1143388 320529a907596704df487d89978e1948
        Size/MD5 checksum:    41296 8e0fed6ae1645411f4daa52842ead589
        Size/MD5 checksum:   163206 d0fc59550e27b346adb422e4d82cecaf
        Size/MD5 checksum:    88476 dfe47fbfeef0a714d6397ec9467165af
    s390 architecture (IBM S/390)
        Size/MD5 checksum:  1037260 a151e36916ffd7eae88e6b82cc0c08d7
        Size/MD5 checksum:    37420 b095022e25c603ee57748795c4ec423b
        Size/MD5 checksum:    82338 3417e5562b6aa064ab5d3d11f15a69fb
        Size/MD5 checksum:    87928 6eea10e5b223fbd5f5a8d524bb03ab8e
        Size/MD5 checksum:  1587330 8b66abd7e3156f3beeaa27fbd971cbde
        Size/MD5 checksum:   166710 10f172f4c48ab9981d7c48564a2142a4
        Size/MD5 checksum:   144932 3955c00c6293f7aec0a7cb9edb28a16d
        Size/MD5 checksum:    52524 b4e639621d58f91a8ec32043534c008f
    sparc architecture (Sun SPARC/UltraSPARC)
        Size/MD5 checksum:    51826 8e3613f9041774f1dd42586782780fb5
        Size/MD5 checksum:   159434 d2352f19b51feab43fc17b5e3f17bb2b
        Size/MD5 checksum:   138734 8b53d144485267cb99ec8a32262446e8
        Size/MD5 checksum:  1577758 748b77d9e54a363d46cd61548e72df7c
        Size/MD5 checksum:   996834 0ad8037cbb3959581a0aeb29eb84a853
        Size/MD5 checksum:    85790 16bf4ce2378a68fc9b0ce4052e463e5d
        Size/MD5 checksum:    36062 426fe5dbac939828393d99e561abf0e3
        Size/MD5 checksum:    78608 f469105c5d9f121c333d5e4ac315c7be
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    How do you feel about the elimination of the terms 'blacklist' and 'slave' from the Linux kernel?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"112","title":"I strongly support this change - racially charged language should not be used in the code and documentation of the kernel and other open-source projects.","votes":"7","type":"x","order":"1","pct":20,"resources":[]},{"id":"113","title":"I'm indifferent - this small change will not affect broader issues of racial insensitivity and white privilege.","votes":"4","type":"x","order":"2","pct":11.43,"resources":[]},{"id":"114","title":"I'm opposed to this change - there is no need to change language that has been used for years. It doesn't make sense for people to take offense to terminology used in community projects.","votes":"24","type":"x","order":"3","pct":68.57,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200


    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.