Lucene search

K

[SECURITY] [DSA 573-1] New cupsys packages fix arbitrary code execution

🗓️ 21 Oct 2004 14:22:18Reported by DebianType 
debian
 debian
🔗 lists.debian.org👁 17 Views

Debian fixes integer overflow in cupsys, preventing remote arbitrary code execution attacks.

Show more
Related
Packages
OSOS VersionArchitecturePackagePackage VersionFilename
Debian3armcupsys-bsd1.1.14-5woody10cupsys-bsd_1.1.14-5woody10_arm.deb
Debian3ia64libcupsys21.1.14-5woody10libcupsys2_1.1.14-5woody10_ia64.deb
Debian3i386cupsys-pstoraster1.1.14-5woody10cupsys-pstoraster_1.1.14-5woody10_i386.deb
Debian3ia64cupsys-bsd1.1.14-5woody10cupsys-bsd_1.1.14-5woody10_ia64.deb
Debian3i386cupsys1.1.14-5woody10cupsys_1.1.14-5woody10_i386.deb
Debian3sparccupsys-bsd1.1.14-5woody10cupsys-bsd_1.1.14-5woody10_sparc.deb
Debian3armlibcupsys21.1.14-5woody10libcupsys2_1.1.14-5woody10_arm.deb
Debian3powerpccupsys-client1.1.14-5woody10cupsys-client_1.1.14-5woody10_powerpc.deb
Debian3i386cupsys-bsd1.1.14-5woody10cupsys-bsd_1.1.14-5woody10_i386.deb
Debian3mipselcupsys-pstoraster1.1.14-5woody10cupsys-pstoraster_1.1.14-5woody10_mipsel.deb
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
21 Oct 2004 14:18Current
6.5Medium risk
Vulners AI Score6.5
CVSS210
EPSS0.075
17
.json
Report