CUPS: New Packages Fix Denial of Service, Arbitrary Code Execution Vulnerabilities

Users of CUPS please be advised of a New packages fix denial of service, arbitrary code execution Vulnerabilities that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

SSA:2010-333-01: [SSA:2010-333-01] cups denial-of-service patch
New cups packages are available for Slackware 12.0, 12.1, 12.2, 13.0, 13.1,

and -current to fix security issues.
Here are the details from the Slackware 13.1 ChangeLog:

+————————–+

patches/packages/cups-1.4.5-i486-1_slack13.1.txz: Upgraded.

Fixed memory corruption bugs that could lead to a denial of service

or possibly execution of arbitrary code through a crafted IPP request.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941

Read more at http://www.criticalwatch.com

 

Advertisements