[bglug] [security@slackware.com: [slackware-security] CUPS DoS vulnerability fixed (SSA:2003-149-01)]
k|b|s
bglug@lists.linux.it
Fri, 30 May 2003 10:47:53 +0200
--gj572EiMnwbLXET9
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Io uso apsfilter ;P
ciao
--=20
Vendo tastiera usata.
-- Posted in free.hobby.seghe
* k|b|s * mailto `echo ti.gulgb@sbk|'rev'`=20
--gj572EiMnwbLXET9
Content-Type: message/rfc822
Content-Disposition: inline
Return-Path: <owner-slackware-security@slackware.com>
Received: from kaiserino.ath.cx [212.183.170.233]
by localhost with POP3 (fetchmail-6.2.2)
for kbs@localhost (single-drop); Fri, 30 May 2003 10:32:19 +0200 (CEST)
Received: from popmail.inwind.it [193.70.192.170]
by localhost with POP3 (fetchmail-6.2.1)
for kbs@localhost (single-drop); Thu, 29 May 2003 12:20:05 +0200 (CEST)
Received: from smtp7.libero.it (193.70.192.90) by ims10a.libero.it (7.0.012)
id 3E95024200BB50D6 for ciosul@inwind.it; Thu, 29 May 2003 12:12:06 +0200
Received: from diamond.ss.org (192.139.81.6) by smtp7.libero.it (7.0.012)
id 3EBBDF8601FC9763 for ciosul@inwind.it; Thu, 29 May 2003 12:12:05 +0200
Received: from bob.slackware.com (slackware.com [64.57.102.34])
by diamond.ss.org (Postfix) with ESMTP
id 18A6F2FB63; Thu, 29 May 2003 05:29:22 -0400 (EDT)
Received: from bob.slackware.com (localhost [127.0.0.1])
by bob.slackware.com (8.12.9/8.12.9) with ESMTP id h4T9Sjks022216;
Thu, 29 May 2003 02:28:45 -0700
Received: from localhost (daemon@localhost)
by bob.slackware.com (8.12.9/8.12.9/Submit) with SMTP id h4T9Sb70022209;
Thu, 29 May 2003 02:28:37 -0700
Received: by bob.slackware.com (bulk_mailer v1.13); Thu, 29 May 2003 02:27:59 -0700
Received: from bob.slackware.com (localhost [127.0.0.1])
by bob.slackware.com (8.12.9/8.12.9) with ESMTP id h4T9Rwks022162
for <slackware-security-outgoing@bob.slackware.com>; Thu, 29 May 2003 02:27:58 -0700
Received: (from daemon@localhost)
by bob.slackware.com (8.12.9/8.12.9/Submit) id h4T9RwA2022161
for slackware-security-outgoing; Thu, 29 May 2003 02:27:58 -0700
Received: from bob.slackware.com (localhost [127.0.0.1])
by bob.slackware.com (8.12.9/8.12.9) with ESMTP id h4T9Rwks022158
for <slackware-security@slackware.com>; Thu, 29 May 2003 02:27:58 -0700
Received: (from root@localhost)
by bob.slackware.com (8.12.9/8.12.9/Submit) id h4T9RwRK022157
for slackware-security@slackware.com; Thu, 29 May 2003 02:27:58 -0700
Received: from bob.slackware.com (localhost [127.0.0.1])
by bob.slackware.com (8.12.9/8.12.9) with ESMTP id h4T9QIks022076
for <slackware-security@slackware.com>; Thu, 29 May 2003 02:26:18 -0700
Received: from localhost (security@localhost)
by bob.slackware.com (8.12.9/8.12.9/Submit) with ESMTP id h4T9QIQY022073
for <slackware-security@slackware.com>; Thu, 29 May 2003 02:26:18 -0700
X-Authentication-Warning: bob.slackware.com: security owned process doing -bs
Date: Thu, 29 May 2003 02:26:18 -0700 (PDT)
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] CUPS DoS vulnerability fixed (SSA:2003-149-01)
Message-ID: <Pine.LNX.4.55.0305290225020.22071@bob.slackware.com>
Sender: owner-slackware-security@slackware.com
Reply-To: Slackware Security Team <security@slackware.com>
Mime-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset=iso-8859-15
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] CUPS DoS vulnerability fixed (SSA:2003-149-01)
Upgraded CUPS packages are available for Slackware 8.1, 9.0,
and -current to fix a denial of service attack vulnerability.
Here are the details from the Slackware 9.0 ChangeLog:
+--------------------------+
Thu May 29 00:52:54 PDT 2003
patches/packages/cups-1.1.19-i386-1.tgz: Upgraded to cups-1.1.19.
A denial of service problem that allowed a CUPS client to hang the CUPS
server is now fixed in CUPS 1.1.19. Note that CUPS is not installed by
default -- it is shipped as one of the packages in /extra.
(* Security fix *)
+--------------------------+
WHERE TO FIND THE NEW PACKAGES:
+-----------------------------+
Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/cups-1.1.19-i386-1.tgz
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/cups-1.1.19-i386-1.tgz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/extra/cups-1.1.19/cups-1.1.19-i486-1.tgz
MD5 SIGNATURES:
+-------------+
Slackware 8.1 package:
c8999b9d8ec4652372d2ef5f26a1c71b cups-1.1.19-i386-1.tgz
Slackware 9.0 package:
72bd865d7b3ff4695340522e1c86ae9c cups-1.1.19-i386-1.tgz
Slackware -current package:
7d5aa6d2408b642f2db46ac8387ada2b cups-1.1.19-i486-1.tgz
INSTALLATION INSTRUCTIONS:
+------------------------+
First, if the CUPS server (cupsd) is running, stop it:
. /etc/rc.d/rc.cups stop
Then upgrade using upgradepkg (as root):
upgradepkg cups-1.1.19-i386-1.tgz
Finally, restart cupsd (if needed):
. /etc/rc.d/rc.cups start
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| HOW TO REMOVE YOURSELF FROM THIS MAILING LIST: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back. Follow the instructions to |
| complete the unsubscription. Do not reply to this message to |
| unsubscribe! |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQE+1cBuakRjwEAQIjMRAtunAJ4t/awb0KZPl4OXgs2ObLCriSGYBQCfQ6zW
0NHuoLNJPXWcu7m6InfcFqU=
=hhxK
-----END PGP SIGNATURE-----
--gj572EiMnwbLXET9--