Friday, December 3, 2010

CUPS: New Packages Fix Denial of Service, Arbitrary Code Execution Vulnerabilities

Users of CUPS please be advised of a New packages fix denial of service, arbitrary code execution Vulnerabilities that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
SSA:2010-333-01: [SSA:2010-333-01] cups denial-of-service patch

New cups packages are available for Slackware 12.0, 12.1, 12.2, 13.0, 13.1,

and -current to fix security issues.
Here are the details from the Slackware 13.1 ChangeLog:

+--------------------------+

patches/packages/cups-1.4.5-i486-1_slack13.1.txz: Upgraded.

Fixed memory corruption bugs that could lead to a denial of service

or possibly execution of arbitrary code through a crafted IPP request.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941
Read more at www.criticalwatch.com
 

No comments:

Post a Comment