Fedora Core 2 Update: cups-1.1.20-11.10

    Date20 Jan 2005
    CategoryFedora
    7172
    Posted ByJoe Shakespeare
    This package fixes a buffer overflow which may possibly allow attackers to execute arbitrary code as the "lp" user. The Common Vulnerabilities and Exposures projects (cve.mitre.org) has assigned the name CAN-2005-0064 to this issue.
    ---------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2005-044
    2005-01-20
    ---------------------------------------------------------------------
    
    Product     : Fedora Core 2
    Name        : cups
    Version     : 1.1.20                     =20
    Release     : 11.10                 =20
    Summary     : Common Unix Printing System
    Description :
    The Common UNIX Printing System provides a portable printing layer for
    UNIX=EF=BF=BD operating systems. It has been developed by Easy Software Pro=
    ducts
    to promote a standard printing solution for all UNIX vendors and users.
    CUPS provides the System V and Berkeley command-line interfaces.
    
    ---------------------------------------------------------------------
    Update Information:
    
    This package fixes a buffer overflow which may possibly allow attackers
    to execute arbitrary code as the "lp" user.  The Common Vulnerabilities
    and Exposures projects (cve.mitre.org) has assigned the name
    CAN-2005-0064 to this issue.
    
    ---------------------------------------------------------------------
    * Mon Jan 17 2005 Tim Waugh  1:1.1.20-11.10
    
    - Applied patch to fix CAN-2005-0064 (bug #145103).
    
    
    ---------------------------------------------------------------------
    This update can be downloaded from:
      http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/
    
    f1ebe63c17f264aa1debecbb00ab386e  SRPMS/cups-1.1.20-11.10.src.rpm
    b77334300e2bf424a5b7e94c06be65e2  x86_64/cups-1.1.20-11.10.x86_64.rpm
    bccf0a1be0b2806d2e8958f3a9c4aeec  x86_64/cups-devel-1.1.20-11.10.x86_64.rpm
    4d16cf715e722623c2845f4e171be821  x86_64/cups-libs-1.1.20-11.10.x86_64.rpm
    5350769d2abe23d48d2221d306b4bc0f  x86_64/debug/cups-debuginfo-1.1.20-11.10.=
    x86_64.rpm
    f32faff89d7cc3f6252fb47096f7dd3e  x86_64/cups-libs-1.1.20-11.10.i386.rpm
    a4db6a5b409b88383bd28220b87beb23  i386/cups-1.1.20-11.10.i386.rpm
    382cc5ebde9fef7b3e25d3c12e0910f6  i386/cups-devel-1.1.20-11.10.i386.rpm
    f32faff89d7cc3f6252fb47096f7dd3e  i386/cups-libs-1.1.20-11.10.i386.rpm
    38137c8b9d0653b6b050edeed1e90bc1  i386/debug/cups-debuginfo-1.1.20-11.10.i3=
    86.rpm
    
    This update can also be installed with the Update Agent; you can
    launch the Update Agent with the 'up2date' command. =20
    ---------------------------------------------------------------------
    
    
    --7WmKeKs0Q+kgNYtV
    Content-Type: application/pgp-signature
    Content-Disposition: inline
    
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.6 (GNU/Linux)
    
    iD8DBQFB75+FHU/d4jnpWe0RApdRAJoCs4TJo02QHaAvXnQpTIazWoCFpACeJ2Dt
    ZvV8wQnvFGGFuEINnkE8sMc=
    =HfIh
    -----END PGP SIGNATURE-----
    
    --7WmKeKs0Q+kgNYtV--
    
    
    --===============0898003307==
    Content-Type: text/plain; charset="us-ascii"
    MIME-Version: 1.0
    Content-Transfer-Encoding: 7bit
    Content-Disposition: inline
    
    --
    fedora-announce-list mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.redhat.com/mailman/listinfo/fedora-announce-list
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"65","type":"x","order":"1","pct":57.52,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.27,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.2,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.