Lucene search

K
slackwareSlackware Linux ProjectSSA-2010-333-01
HistoryNov 30, 2010 - 2:40 a.m.

[slackware-security] cups

2010-11-3002:40:23
Slackware Linux Project
www.slackware.com
15

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.691 Medium

EPSS

Percentile

98.0%

New cups packages are available for Slackware 12.0, 12.1, 12.2, 13.0, 13.1,
and -current to fix security issues.

Here are the details from the Slackware 13.1 ChangeLog:

patches/packages/cups-1.4.5-i486-1_slack13.1.txz: Upgraded.
Fixed memory corruption bugs that could lead to a denial of service
or possibly execution of arbitrary code through a crafted IPP request.
https://vulners.com/cve/CVE-2010-2941
(* Security fix *)

Where to find the new packages:

HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
directly from ftp.slackware.com.

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 12.0:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/cups-1.3.11-i486-1_slack12.0.tgz

Updated package for Slackware 12.1:
ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/cups-1.3.11-i486-1_slack12.1.tgz

Updated package for Slackware 12.2:
ftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/cups-1.3.11-i486-1_slack12.2.tgz

Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/cups-1.3.11-i486-2_slack13.0.txz

Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/cups-1.3.11-x86_64-2_slack13.0.txz

Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/cups-1.4.5-i486-1_slack13.1.txz

Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/cups-1.4.5-x86_64-1_slack13.1.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/cups-1.4.5-i486-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/cups-1.4.5-x86_64-1.txz

MD5 signatures:

Slackware 12.0 package:
762ee07dbb88595593636568ed240731 cups-1.3.11-i486-1_slack12.0.tgz

Slackware 12.1 package:
ab01404cc7c216659936e044b8240459 cups-1.3.11-i486-1_slack12.1.tgz

Slackware 12.2 package:
8a3637d485937dec15ceff5ca382cbdd cups-1.3.11-i486-1_slack12.2.tgz

Slackware 13.0 package:
d2e9d18e77bf61bdcdfb4b1806374156 cups-1.3.11-i486-2_slack13.0.txz

Slackware x86_64 13.0 package:
8c30afdf61bad44ff2da9c157d6d8f6b cups-1.3.11-x86_64-2_slack13.0.txz

Slackware 13.1 package:
9f57bd4262aa861fc19544b8af5bf561 cups-1.4.5-i486-1_slack13.1.txz

Slackware x86_64 13.1 package:
bfc4a72cea8443f4c07922297e2f60b2 cups-1.4.5-x86_64-1_slack13.1.txz

Slackware -current package:
b95f1b2854334c4d0f9dae3f8a06a787 cups-1.4.5-i486-1.txz

Slackware x86_64 -current package:
8a54fb8a0bd9a6dcfc1d25abf2e4b0f9 cups-1.4.5-x86_64-1.txz

Installation instructions:

Upgrade the packages as root:
> upgradepkg cups-1.4.5-i486-1_slack13.1.txz

Then, restart the cups server:
> sh /etc/rc.d/rc.cups restart

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.691 Medium

EPSS

Percentile

98.0%