[SECURITY] Fedora 10 Update: cups-1.3.10-1.fc10
updates at fedoraproject.org
updates at fedoraproject.org
Wed Apr 22 00:50:31 UTC 2009
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2009-3769
2009-04-21 23:54:58
--------------------------------------------------------------------------------
Name : cups
Product : Fedora 10
Version : 1.3.10
Release : 1.fc10
URL : http://www.cups.org/
Summary : Common Unix Printing System
Description :
The Common UNIX Printing System provides a portable printing layer for
UNIX® operating systems. It has been developed by Easy Software Products
to promote a standard printing solution for all UNIX vendors and users.
CUPS provides the System V and Berkeley command-line interfaces.
--------------------------------------------------------------------------------
Update Information:
This update fixes several security issues: CVE-2009-0163, CVE-2009-0164,
CVE-2009-0146, CVE-2009-0147, and CVE-2009-0166. PDF files are now converted
to PostScript using the poppler package's "pdftops" program. NOTE: If your
CUPS server is accessed using a hostname or hostnames not known to the server
itself you must add "ServerAlias hostname" to cupsd.conf for each such name.
The special line "ServerAlias *" disables checking (but this allows DNS
rebinding attacks).
--------------------------------------------------------------------------------
ChangeLog:
* Tue Apr 21 2009 Tim Waugh <twaugh at redhat.com> 1:1.3.10-1
- 1.3.10. No longer need ext, includeifexists, str2988,
CVE-2008-5183, CVE-2008-5286, str3077, str3078, str3059, str3055 patches.
- Requires poppler-utils.
- NOTE: If your CUPS server is accessed using a hostname or hostnames
not known to the server itself you must add "ServerAlias hostname"
for each such name. The special line "ServerAlias *" disables checking
(but this allows DNS rebinding attacks).
* Mon Mar 9 2009 Tim Waugh <twaugh at redhat.com> 1:1.3.9-9
- Fixed getnameddest patch (bug #481481, STR #3082).
- Handle https:// device URIs (bug #478677, STR #3122).
* Wed Jan 28 2009 Tim Waugh <twaugh at redhat.com> 1:1.3.9-8
- Always supply document-name when printing a file (STR #3055).
- Load MIME type rules correctly (bug #426089, STR #3059).
* Wed Jan 28 2009 Tim Waugh <twaugh at redhat.com> 1:1.3.9-7
- Fixed quotas (STR #3077, STR #3078).
* Tue Dec 9 2008 Tim Waugh <twaugh at redhat.com> 1:1.3.9-6
- Attempt to unbreak the fix for STR #2831 (bug #474742).
* Mon Dec 8 2008 Tim Waugh <twaugh at redhat.com> 1:1.3.9-5
- Removed dnssd backend as it was causing problems (bug #475230).
* Wed Dec 3 2008 Tim Waugh <twaugh at redhat.com> 1:1.3.9-4
- Applied patch to fix STR #2974 (bug #473905, CVE-2008-5286,
CVE-2008-1722).
- Applied patch to fix RSS subscription limiting (bug #473901,
CVE-2008-5183).
- Fixed cups-polld again for res_init (STR #3023, bug #354071).
- Added patch to avoid polling busy loop (STR #2988).
* Thu Oct 30 2008 Tim Waugh <twaugh at redhat.com> 1:1.3.9-3
- Fixed LSPP labels (bug #468442).
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #490597 - CVE-2009-0164 cups: insufficient checking of the HTTP Host: header
https://bugzilla.redhat.com/show_bug.cgi?id=490597
[ 2 ] Bug #490596 - CVE-2009-0163 cups: Integer overflow in the TIFF image filter
https://bugzilla.redhat.com/show_bug.cgi?id=490596
[ 3 ] Bug #490612 - CVE-2009-0146 xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap, readSymbolDictSeg)
https://bugzilla.redhat.com/show_bug.cgi?id=490612
[ 4 ] Bug #490614 - CVE-2009-0147 xpdf: Multiple integer overflows in JBIG2 decoder
https://bugzilla.redhat.com/show_bug.cgi?id=490614
[ 5 ] Bug #490625 - CVE-2009-0166 xpdf: Freeing of potentially uninitialized memory in JBIG2 decoder
https://bugzilla.redhat.com/show_bug.cgi?id=490625
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update cups' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------
More information about the Fedora-package-announce
mailing list