A
Admin
Guest
Security Advisory - RHSA-2003:275-07
------------------------------------------------------------------------------
Summary:
Updated CUPS packages fix denial of service
Updated CUPS packages that fix a problem where CUPS can hang are now available.
Description:
CUPS is a print spooler.
Paul Mitcheson reported a situation where the CUPS Internet Printing
Protocol (IPP) implementation in CUPS versions prior to 1.1.19 would get
into a busy loop. This could result in a denial of service. In order to
exploit this bug an attacker would need to have the ability to make a TCP
connection to the IPP port (by default 631).
Users of CUPS are advised to install these updated packages, which contain
a backported security patch and are not vulnerable to this issue.
These packages also fix a problem with the LPD backend that could cause
jobs to be repeated.
References:
http://www.cups.org/str.php?L315+P0+S0+C0+I0+E0+Q
------------------------------------------------------------------------------
-------------
Taking Action
-------------
You may address the issues outlined in this advisory in two ways:
- select your server name by clicking on its name from the list
available at the following location, and then schedule an
errata update for it:
https://rhn.redhat.com/network/systemlist/system_list.pxt
- run the Update Agent on each affected server.
------------------------------------------------------------------------------
Summary:
Updated CUPS packages fix denial of service
Updated CUPS packages that fix a problem where CUPS can hang are now available.
Description:
CUPS is a print spooler.
Paul Mitcheson reported a situation where the CUPS Internet Printing
Protocol (IPP) implementation in CUPS versions prior to 1.1.19 would get
into a busy loop. This could result in a denial of service. In order to
exploit this bug an attacker would need to have the ability to make a TCP
connection to the IPP port (by default 631).
Users of CUPS are advised to install these updated packages, which contain
a backported security patch and are not vulnerable to this issue.
These packages also fix a problem with the LPD backend that could cause
jobs to be repeated.
References:
http://www.cups.org/str.php?L315+P0+S0+C0+I0+E0+Q
------------------------------------------------------------------------------
-------------
Taking Action
-------------
You may address the issues outlined in this advisory in two ways:
- select your server name by clicking on its name from the list
available at the following location, and then schedule an
errata update for it:
https://rhn.redhat.com/network/systemlist/system_list.pxt
- run the Update Agent on each affected server.