Users of CUPS please be advised of a New packages fix denial of service, arbitrary code execution Vulnerabilities that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
SSA:2010-333-01: [SSA:2010-333-01] cups denial-of-service patch
New cups packages are available for Slackware 12.0, 12.1, 12.2, 13.0, 13.1,
and -current to fix security issues.
Here are the details from the Slackware 13.1 ChangeLog:Read more at www.criticalwatch.com
+--------------------------+
patches/packages/cups-1.4.5-i486-1_slack13.1.txz: Upgraded.
Fixed memory corruption bugs that could lead to a denial of service
or possibly execution of arbitrary code through a crafted IPP request.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941
See this Amp at http://bit.ly/eQMVfZ
No comments:
Post a Comment