Lucene search

K
centosCentOS ProjectCESA-2005:772
HistorySep 27, 2005 - 12:53 p.m.

cups security update

2005-09-2712:53:05
CentOS Project
lists.centos.org
39

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.119 Low

EPSS

Percentile

95.3%

CentOS Errata and Security Advisory CESA-2005:772

The Common UNIX Printing System (CUPS) provides a portable printing layer
for UNIX® operating systems.

A bug was found in the way CUPS processes malformed HTTP requests. It is
possible for a remote user capable of connecting to the CUPS daemon to
issue a malformed HTTP GET request that causes CUPS to enter an
infinite loop. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-2874 to this issue.

Two small bugs have also been fixed in this update. A signal handling
problem has been fixed that could occasionally cause the scheduler to stop
when told to reload. A problem with tracking open file descriptors under
certain specific circumstances has also been fixed.

All users of CUPS should upgrade to these erratum packages, which contain a
patch to correct this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-September/074357.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074358.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074367.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074368.html

Affected packages:
cups
cups-devel
cups-libs

Upstream details at:
https://access.redhat.com/errata/RHSA-2005:772

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.119 Low

EPSS

Percentile

95.3%