Important update for CUPS security with multiple flaws including integer overflow, buffer overflow, and denial of service vulnerabilities
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | cups security update | 17 Apr 200913:26 | – | centos |
![]() | kdegraphics security update | 17 Apr 200913:27 | – | centos |
![]() | xpdf security update | 17 Apr 200912:50 | – | centos |
![]() | gpdf security update | 3 May 200912:25 | – | centos |
![]() | poppler security update | 15 May 200913:28 | – | centos |
![]() | tetex security update | 28 May 201010:47 | – | centos |
![]() | tetex security update | 7 May 201022:21 | – | centos |
![]() | cups security update | 16 Apr 200900:00 | – | oraclelinux |
![]() | kdegraphics security update | 16 Apr 200900:00 | – | oraclelinux |
![]() | xpdf security update | 16 Apr 200900:00 | – | oraclelinux |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | i386 | cups-libs | 1.3.7-8.el5_3.4 | cups-libs-1.3.7-8.el5_3.4.i386.rpm |
RedHat | 5 | x86_64 | cups-devel | 1.3.7-8.el5_3.4 | cups-devel-1.3.7-8.el5_3.4.x86_64.rpm |
RedHat | 4 | s390x | cups-libs | 1.1.22-0.rc1.9.27.el4_7.5 | cups-libs-1.1.22-0.rc1.9.27.el4_7.5.s390x.rpm |
RedHat | 4 | x86_64 | cups-libs | 1.1.22-0.rc1.9.27.el4_7.5 | cups-libs-1.1.22-0.rc1.9.27.el4_7.5.x86_64.rpm |
RedHat | 5 | s390 | cups-devel | 1.3.7-8.el5_3.4 | cups-devel-1.3.7-8.el5_3.4.s390.rpm |
RedHat | 5 | src | cups | 1.3.7-8.el5_3.4 | cups-1.3.7-8.el5_3.4.src.rpm |
RedHat | 5 | ppc64 | cups-devel | 1.3.7-8.el5_3.4 | cups-devel-1.3.7-8.el5_3.4.ppc64.rpm |
RedHat | 5 | ia64 | cups-libs | 1.3.7-8.el5_3.4 | cups-libs-1.3.7-8.el5_3.4.ia64.rpm |
RedHat | 4 | x86_64 | cups | 1.1.22-0.rc1.9.27.el4_7.5 | cups-1.1.22-0.rc1.9.27.el4_7.5.x86_64.rpm |
RedHat | 5 | ia64 | cups-lpd | 1.3.7-8.el5_3.4 | cups-lpd-1.3.7-8.el5_3.4.ia64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo