[bglug] [security@slackware.com: [slackware-security] CUPS DoS vulnerability fixed (SSA:2003-149-01)]

k|b|s bglug@lists.linux.it
Fri, 30 May 2003 10:47:53 +0200


--gj572EiMnwbLXET9
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Io uso apsfilter ;P
ciao

--=20
Vendo tastiera usata.
	-- Posted in free.hobby.seghe
* k|b|s * mailto `echo ti.gulgb@sbk|'rev'`=20


--gj572EiMnwbLXET9
Content-Type: message/rfc822
Content-Disposition: inline

Return-Path: <owner-slackware-security@slackware.com>
Received: from kaiserino.ath.cx [212.183.170.233]
	by localhost with POP3 (fetchmail-6.2.2)
	for kbs@localhost (single-drop); Fri, 30 May 2003 10:32:19 +0200 (CEST)
Received: from popmail.inwind.it [193.70.192.170]
	by localhost with POP3 (fetchmail-6.2.1)
	for kbs@localhost (single-drop); Thu, 29 May 2003 12:20:05 +0200 (CEST)
Received: from smtp7.libero.it (193.70.192.90) by ims10a.libero.it (7.0.012)
        id 3E95024200BB50D6 for ciosul@inwind.it; Thu, 29 May 2003 12:12:06 +0200
Received: from diamond.ss.org (192.139.81.6) by smtp7.libero.it (7.0.012)
        id 3EBBDF8601FC9763 for ciosul@inwind.it; Thu, 29 May 2003 12:12:05 +0200
Received: from bob.slackware.com (slackware.com [64.57.102.34])
	by diamond.ss.org (Postfix) with ESMTP
	id 18A6F2FB63; Thu, 29 May 2003 05:29:22 -0400 (EDT)
Received: from bob.slackware.com (localhost [127.0.0.1])
	by bob.slackware.com (8.12.9/8.12.9) with ESMTP id h4T9Sjks022216;
	Thu, 29 May 2003 02:28:45 -0700
Received: from localhost (daemon@localhost)
	by bob.slackware.com (8.12.9/8.12.9/Submit) with SMTP id h4T9Sb70022209;
	Thu, 29 May 2003 02:28:37 -0700
Received: by bob.slackware.com (bulk_mailer v1.13); Thu, 29 May 2003 02:27:59 -0700
Received: from bob.slackware.com (localhost [127.0.0.1])
	by bob.slackware.com (8.12.9/8.12.9) with ESMTP id h4T9Rwks022162
	for <slackware-security-outgoing@bob.slackware.com>; Thu, 29 May 2003 02:27:58 -0700
Received: (from daemon@localhost)
	by bob.slackware.com (8.12.9/8.12.9/Submit) id h4T9RwA2022161
	for slackware-security-outgoing; Thu, 29 May 2003 02:27:58 -0700
Received: from bob.slackware.com (localhost [127.0.0.1])
	by bob.slackware.com (8.12.9/8.12.9) with ESMTP id h4T9Rwks022158
	for <slackware-security@slackware.com>; Thu, 29 May 2003 02:27:58 -0700
Received: (from root@localhost)
	by bob.slackware.com (8.12.9/8.12.9/Submit) id h4T9RwRK022157
	for slackware-security@slackware.com; Thu, 29 May 2003 02:27:58 -0700
Received: from bob.slackware.com (localhost [127.0.0.1])
	by bob.slackware.com (8.12.9/8.12.9) with ESMTP id h4T9QIks022076
	for <slackware-security@slackware.com>; Thu, 29 May 2003 02:26:18 -0700
Received: from localhost (security@localhost)
	by bob.slackware.com (8.12.9/8.12.9/Submit) with ESMTP id h4T9QIQY022073
	for <slackware-security@slackware.com>; Thu, 29 May 2003 02:26:18 -0700
X-Authentication-Warning: bob.slackware.com: security owned process doing -bs
Date: Thu, 29 May 2003 02:26:18 -0700 (PDT)
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security]  CUPS DoS vulnerability fixed (SSA:2003-149-01)
Message-ID: <Pine.LNX.4.55.0305290225020.22071@bob.slackware.com>
Sender: owner-slackware-security@slackware.com
Reply-To: Slackware Security Team <security@slackware.com>
Mime-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset=iso-8859-15


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  CUPS DoS vulnerability fixed (SSA:2003-149-01)

Upgraded CUPS packages are available for Slackware 8.1, 9.0,
and -current to fix a denial of service attack vulnerability.


Here are the details from the Slackware 9.0 ChangeLog:
+--------------------------+
Thu May 29 00:52:54 PDT 2003
patches/packages/cups-1.1.19-i386-1.tgz:  Upgraded to cups-1.1.19.
  A denial of service problem that allowed a CUPS client to hang the CUPS
  server is now fixed in CUPS 1.1.19.  Note that CUPS is not installed by
  default -- it is shipped as one of the packages in /extra.
  (* Security fix *)
+--------------------------+



WHERE TO FIND THE NEW PACKAGES:
+-----------------------------+

Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/cups-1.1.19-i386-1.tgz

Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/cups-1.1.19-i386-1.tgz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/extra/cups-1.1.19/cups-1.1.19-i486-1.tgz



MD5 SIGNATURES:
+-------------+

Slackware 8.1 package:
c8999b9d8ec4652372d2ef5f26a1c71b  cups-1.1.19-i386-1.tgz

Slackware 9.0 package:
72bd865d7b3ff4695340522e1c86ae9c  cups-1.1.19-i386-1.tgz

Slackware -current package:
7d5aa6d2408b642f2db46ac8387ada2b  cups-1.1.19-i486-1.tgz



INSTALLATION INSTRUCTIONS:
+------------------------+

First, if the CUPS server (cupsd) is running, stop it:
. /etc/rc.d/rc.cups stop

Then upgrade using upgradepkg (as root):
upgradepkg cups-1.1.19-i386-1.tgz

Finally, restart cupsd (if needed):
. /etc/rc.d/rc.cups start



+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| HOW TO REMOVE YOURSELF FROM THIS MAILING LIST:                         |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back.  Follow the instructions to  |
| complete the unsubscription.  Do not reply to this message to          |
| unsubscribe!                                                           |
+------------------------------------------------------------------------+

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE+1cBuakRjwEAQIjMRAtunAJ4t/awb0KZPl4OXgs2ObLCriSGYBQCfQ6zW
0NHuoLNJPXWcu7m6InfcFqU=
=hhxK
-----END PGP SIGNATURE-----


--gj572EiMnwbLXET9--