Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-5286
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:49:12.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20081201 (sort of urgent) CVE Request -- cups (repost)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/12/01/1" }, { "name": "33101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33101" }, { "name": "32518", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32518" }, { "name": "GLSA-200812-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml" }, { "name": "oval:org.mitre.oval:def:10058", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058" }, { "name": "33111", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33111" }, { "name": "RHSA-2008:1028", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-1028.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.cups.org/str.php?L2974" }, { "name": "GLSA-200812-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml" }, { "name": "MDVSA-2009:029", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:029" }, { "name": "SUSE-SR:2009:002", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html" }, { "name": "33568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33568" }, { "name": "DSA-1677", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1677" }, { "name": "32962", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32962" }, { "name": "1021298", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021298" }, { "name": "ADV-2008-3315", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3315" }, { "name": "cups-cupsimagereadpng-overflow(46933)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46933" }, { "name": "MDVSA-2009:028", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:028" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-11-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20081201 (sort of urgent) CVE Request -- cups (repost)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/12/01/1" }, { "name": "33101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33101" }, { "name": "32518", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32518" }, { "name": "GLSA-200812-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml" }, { "name": "oval:org.mitre.oval:def:10058", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058" }, { "name": "33111", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33111" }, { "name": "RHSA-2008:1028", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-1028.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.cups.org/str.php?L2974" }, { "name": "GLSA-200812-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml" }, { "name": "MDVSA-2009:029", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:029" }, { "name": "SUSE-SR:2009:002", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html" }, { "name": "33568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33568" }, { "name": "DSA-1677", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1677" }, { "name": "32962", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32962" }, { "name": "1021298", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021298" }, { "name": "ADV-2008-3315", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3315" }, { "name": "cups-cupsimagereadpng-overflow(46933)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46933" }, { "name": "MDVSA-2009:028", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:028" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5286", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20081201 (sort of urgent) CVE Request -- cups (repost)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/12/01/1" }, { "name": "33101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33101" }, { "name": "32518", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32518" }, { "name": "GLSA-200812-11", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml" }, { "name": "oval:org.mitre.oval:def:10058", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058" }, { "name": "33111", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33111" }, { "name": "RHSA-2008:1028", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-1028.html" }, { "name": "http://www.cups.org/str.php?L2974", "refsource": "CONFIRM", "url": "http://www.cups.org/str.php?L2974" }, { "name": "GLSA-200812-01", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml" }, { "name": "MDVSA-2009:029", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:029" }, { "name": "SUSE-SR:2009:002", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html" }, { "name": "33568", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33568" }, { "name": "DSA-1677", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1677" }, { "name": "32962", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32962" }, { "name": "1021298", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021298" }, { "name": "ADV-2008-3315", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3315" }, { "name": "cups-cupsimagereadpng-overflow(46933)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46933" }, { "name": "MDVSA-2009:028", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:028" }, { "name": "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt", "refsource": "CONFIRM", "url": "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5286", "datePublished": "2008-12-01T15:00:00", "dateReserved": "2008-12-01T00:00:00", "dateUpdated": "2024-08-07T10:49:12.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8335D4E3-563D-4288-B708-A9635BCA595F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5279D055-248A-4BD1-9FBB-0024BA16DF5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF791C1D-9AF8-4F0F-8F4B-844BC9A55DFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"16519855-FCB9-44A8-9C7E-116192327BAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1D9330B-C51A-4C7D-A322-85103C64D86C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DA0C19F-95EB-429C-AF06-A2C1D5643662\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"225CCE80-FF4B-4B39-B8BD-EB4710047524\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"07925DD8-50C0-4908-95D1-7342A4617BBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48A519DB-6C6D-4094-814D-33BD5EF389BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6ED7566-5092-4B08-97A9-B2B53117A224\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"98DCAC0C-896F-4353-A665-5BCD0D8AEBA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E72614CD-8F70-4E07-AD83-8FDE8026CEC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"48E62419-C165-4B42-8C23-E24821BD4BB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"217D804B-CA56-49CE-B9EB-2A297EB1763C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"A41E8583-C837-4871-B4D2-FD41C78D538E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D480C37B-0DA8-4096-80B0-5198FE589A4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"74F5A83B-3C1A-49F3-A9D6-F7B9B897E447\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"241D4183-879D-4974-BACB-A6987EDA2E7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96592A93-4967-4B91-BCF7-558DC472E7BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8758715D-B973-4960-8B7D-6F9A11E73288\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"0370E9EB-B830-4362-B83C-912579695691\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA3EC6EE-720D-4F27-A2E1-88AE53FC41A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D644926A-C2A5-45FE-85A3-2782CE87ED86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFB34629-DB13-4164-8A18-BD818E50528B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D432471-B5FD-4B1D-82DF-6F3152752071\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"960DE41E-63DB-45EB-9B19-6349BDA05086\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"A57D2299-3409-4907-9FC0-5C3C715CDB37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7EB92FA-3669-4530-BE69-84CF01D98FF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0696E675-0A13-45FC-8917-845E6FF7A311\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78BAC98C-1FE6-42A3-8B62-E3C321914F6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCC3EF2F-0140-4185-9FB3-2B595B61CDC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C36785A-F735-45C0-986B-9624AD65F0C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C1D3916-607F-44E8-9D47-93C6C0789083\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"174613C3-A04B-4701-849B-BAA598BF4F72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81C1137C-BE3D-45F9-83C9-D212107F0E14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CBC1F81-E93A-42A7-8BC8-4B903688F2E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FA876FF-C58A-45CF-A8E8-E2068DF79421\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FD78771-BD9A-4AC2-B664-B189DD288FB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50A16424-732F-4B76-A753-1642A97BC1EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E189C976-2DD2-485C-828E-7FC3DC6A8F32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A86CA90F-A944-4F3E-B75F-8147125335D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*\", \"matchCriteriaId\": \"690C4DEC-1467-4D7D-8E73-6EE1758439D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB5CA96B-411E-47BE-81A1-1C2E240A25F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA5A29C9-1913-4B8F-B162-66E71BEABD1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FAFABDC-E40F-4C53-AC66-94EFD077665D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42A2F7B3-F4A7-416E-A07F-D4C5F0768B6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F96C1B80-9E20-4832-8308-BF7911569EF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F2D7DB3-F467-4BC0-83BB-4706D067A2C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABD33C2C-7D39-4CCE-AC99-BC7B1B205A4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46C394DC-65A7-4713-B823-6F5D329A0C5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5E9F74F-3C7D-486A-8BA1-EE2A73160B39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69BD64BB-BDA7-4F82-8324-B7C7C941133C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCAEE03E-0B8A-4D10-BD4D-2DA25B7BBE16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C671B95-8892-4D71-87FE-BABF5CBEC144\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.\"}, {\"lang\": \"es\", \"value\": \"Un desbordamiento de entero en la funci\\u00f3n _cupsImageReadPNG en CUPS 1.1.17 hasta 1.3.9 permite a atacantes remotos ejecutar c\\u00f3digo arbitrario a trav\\u00e9s de una imagen PNG con un gran valor de altura, lo cual impide una correcta comprobaci\\u00f3n de validaci\\u00f3n y ocasiona un desbordamiento de b\\u00fafer.\"}]", "id": "CVE-2008-5286", "lastModified": "2024-11-21T00:53:44.217", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}", "published": "2008-12-01T15:30:03.640", "references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/32962\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/33101\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/33111\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/33568\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.cups.org/str.php?L2974\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1677\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:028\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:029\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2008/12/01/1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-1028.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/32518\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securitytracker.com/id?1021298\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3315\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/46933\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/32962\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/33101\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/33111\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/33568\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cups.org/str.php?L2974\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1677\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:028\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:029\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2008/12/01/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-1028.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/32518\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securitytracker.com/id?1021298\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3315\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/46933\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-189\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2008-5286\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-12-01T15:30:03.640\",\"lastModified\":\"2024-11-21T00:53:44.217\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de entero en la funci\u00f3n _cupsImageReadPNG en CUPS 1.1.17 hasta 1.3.9 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una imagen PNG con un gran valor de altura, lo cual impide una correcta comprobaci\u00f3n de validaci\u00f3n y ocasiona un desbordamiento de b\u00fafer.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8335D4E3-563D-4288-B708-A9635BCA595F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5279D055-248A-4BD1-9FBB-0024BA16DF5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF791C1D-9AF8-4F0F-8F4B-844BC9A55DFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"16519855-FCB9-44A8-9C7E-116192327BAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D9330B-C51A-4C7D-A322-85103C64D86C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA0C19F-95EB-429C-AF06-A2C1D5643662\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CCE80-FF4B-4B39-B8BD-EB4710047524\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"07925DD8-50C0-4908-95D1-7342A4617BBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48A519DB-6C6D-4094-814D-33BD5EF389BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6ED7566-5092-4B08-97A9-B2B53117A224\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"98DCAC0C-896F-4353-A665-5BCD0D8AEBA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E72614CD-8F70-4E07-AD83-8FDE8026CEC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"48E62419-C165-4B42-8C23-E24821BD4BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"217D804B-CA56-49CE-B9EB-2A297EB1763C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"A41E8583-C837-4871-B4D2-FD41C78D538E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D480C37B-0DA8-4096-80B0-5198FE589A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F5A83B-3C1A-49F3-A9D6-F7B9B897E447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"241D4183-879D-4974-BACB-A6987EDA2E7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96592A93-4967-4B91-BCF7-558DC472E7BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8758715D-B973-4960-8B7D-6F9A11E73288\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0370E9EB-B830-4362-B83C-912579695691\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA3EC6EE-720D-4F27-A2E1-88AE53FC41A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D644926A-C2A5-45FE-85A3-2782CE87ED86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB34629-DB13-4164-8A18-BD818E50528B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D432471-B5FD-4B1D-82DF-6F3152752071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"960DE41E-63DB-45EB-9B19-6349BDA05086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A57D2299-3409-4907-9FC0-5C3C715CDB37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7EB92FA-3669-4530-BE69-84CF01D98FF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0696E675-0A13-45FC-8917-845E6FF7A311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78BAC98C-1FE6-42A3-8B62-E3C321914F6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCC3EF2F-0140-4185-9FB3-2B595B61CDC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C36785A-F735-45C0-986B-9624AD65F0C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C1D3916-607F-44E8-9D47-93C6C0789083\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"174613C3-A04B-4701-849B-BAA598BF4F72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81C1137C-BE3D-45F9-83C9-D212107F0E14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CBC1F81-E93A-42A7-8BC8-4B903688F2E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FA876FF-C58A-45CF-A8E8-E2068DF79421\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FD78771-BD9A-4AC2-B664-B189DD288FB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50A16424-732F-4B76-A753-1642A97BC1EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E189C976-2DD2-485C-828E-7FC3DC6A8F32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A86CA90F-A944-4F3E-B75F-8147125335D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"690C4DEC-1467-4D7D-8E73-6EE1758439D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5CA96B-411E-47BE-81A1-1C2E240A25F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA5A29C9-1913-4B8F-B162-66E71BEABD1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FAFABDC-E40F-4C53-AC66-94EFD077665D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42A2F7B3-F4A7-416E-A07F-D4C5F0768B6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96C1B80-9E20-4832-8308-BF7911569EF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F2D7DB3-F467-4BC0-83BB-4706D067A2C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD33C2C-7D39-4CCE-AC99-BC7B1B205A4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46C394DC-65A7-4713-B823-6F5D329A0C5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5E9F74F-3C7D-486A-8BA1-EE2A73160B39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69BD64BB-BDA7-4F82-8324-B7C7C941133C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCAEE03E-0B8A-4D10-BD4D-2DA25B7BBE16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C671B95-8892-4D71-87FE-BABF5CBEC144\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/32962\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/33101\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/33111\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/33568\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cups.org/str.php?L2974\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1677\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:028\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:029\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/12/01/1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-1028.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/32518\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1021298\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3315\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/46933\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32962\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33101\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33111\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33568\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cups.org/str.php?L2974\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1677\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:028\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:029\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/12/01/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-1028.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/32518\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1021298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3315\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/46933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
RHSA-2008:1028
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated cups packages that fix a security issue are now available for Red\nHat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Common UNIX\u00ae Printing System (CUPS) provides a portable printing layer\nfor UNIX operating systems.\n\nAn integer overflow flaw, leading to a heap buffer overflow, was discovered\nin the Portable Network Graphics (PNG) decoding routines used by the CUPS\nimage-converting filters, \"imagetops\" and \"imagetoraster\". An attacker\ncould create a malicious PNG file that could, potentially, execute\narbitrary code as the \"lp\" user if the file was printed. (CVE-2008-5286)\n\nCUPS users should upgrade to these updated packages, which contain a\nbackported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:1028", "url": "https://access.redhat.com/errata/RHSA-2008:1028" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "473905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473905" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_1028.json" } ], "title": "Red Hat Security Advisory: cups security update", "tracking": { "current_release_date": "2024-11-22T02:24:21+00:00", "generator": { "date": "2024-11-22T02:24:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:1028", "initial_release_date": "2008-12-15T13:20:00+00:00", "revision_history": [ { "date": "2008-12-15T13:20:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-12-15T08:22:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:24:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.ia64", "product": { "name": "cups-1:1.1.17-13.3.55.ia64", "product_id": "cups-1:1.1.17-13.3.55.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.ia64", "product": { "name": "cups-libs-1:1.1.17-13.3.55.ia64", "product_id": "cups-libs-1:1.1.17-13.3.55.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.ia64", "product": { "name": "cups-devel-1:1.1.17-13.3.55.ia64", "product_id": "cups-devel-1:1.1.17-13.3.55.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=ia64\u0026epoch=1" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.i386", "product": { "name": "cups-libs-1:1.1.17-13.3.55.i386", "product_id": "cups-libs-1:1.1.17-13.3.55.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.i386", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.i386", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.i386", "product": { "name": "cups-1:1.1.17-13.3.55.i386", "product_id": "cups-1:1.1.17-13.3.55.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.i386", "product": { "name": "cups-devel-1:1.1.17-13.3.55.i386", "product_id": "cups-devel-1:1.1.17-13.3.55.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.src", "product": { "name": "cups-1:1.1.17-13.3.55.src", "product_id": "cups-1:1.1.17-13.3.55.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.x86_64", "product": { "name": "cups-1:1.1.17-13.3.55.x86_64", "product_id": "cups-1:1.1.17-13.3.55.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.x86_64", "product": { "name": "cups-libs-1:1.1.17-13.3.55.x86_64", "product_id": "cups-libs-1:1.1.17-13.3.55.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.x86_64", "product": { "name": "cups-devel-1:1.1.17-13.3.55.x86_64", "product_id": "cups-devel-1:1.1.17-13.3.55.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.ppc", "product": { "name": "cups-1:1.1.17-13.3.55.ppc", "product_id": "cups-1:1.1.17-13.3.55.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.ppc", "product": { "name": "cups-libs-1:1.1.17-13.3.55.ppc", "product_id": "cups-libs-1:1.1.17-13.3.55.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.ppc", "product": { "name": "cups-devel-1:1.1.17-13.3.55.ppc", "product_id": "cups-devel-1:1.1.17-13.3.55.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.ppc64", "product": { "name": "cups-libs-1:1.1.17-13.3.55.ppc64", "product_id": "cups-libs-1:1.1.17-13.3.55.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.s390x", "product": { "name": "cups-1:1.1.17-13.3.55.s390x", "product_id": "cups-1:1.1.17-13.3.55.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.s390x", "product": { "name": "cups-libs-1:1.1.17-13.3.55.s390x", "product_id": "cups-libs-1:1.1.17-13.3.55.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.s390x", "product": { "name": "cups-devel-1:1.1.17-13.3.55.s390x", "product_id": "cups-devel-1:1.1.17-13.3.55.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.s390", "product": { "name": "cups-libs-1:1.1.17-13.3.55.s390", "product_id": "cups-libs-1:1.1.17-13.3.55.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.s390", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.s390", "product": { "name": "cups-1:1.1.17-13.3.55.s390", "product_id": "cups-1:1.1.17-13.3.55.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.s390", "product": { "name": "cups-devel-1:1.1.17-13.3.55.s390", "product_id": "cups-devel-1:1.1.17-13.3.55.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.src" }, "product_reference": "cups-1:1.1.17-13.3.55.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.src" }, "product_reference": "cups-1:1.1.17-13.3.55.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.src" }, "product_reference": "cups-1:1.1.17-13.3.55.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.src" }, "product_reference": "cups-1:1.1.17-13.3.55.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-5286", "discovery_date": "2008-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "473905" } ], "notes": [ { "category": "description", "text": "Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: Incomplete fix for CVE-2008-1722", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:cups-1:1.1.17-13.3.55.i386", "3AS:cups-1:1.1.17-13.3.55.ia64", "3AS:cups-1:1.1.17-13.3.55.ppc", "3AS:cups-1:1.1.17-13.3.55.s390", "3AS:cups-1:1.1.17-13.3.55.s390x", "3AS:cups-1:1.1.17-13.3.55.src", "3AS:cups-1:1.1.17-13.3.55.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3AS:cups-devel-1:1.1.17-13.3.55.i386", "3AS:cups-devel-1:1.1.17-13.3.55.ia64", "3AS:cups-devel-1:1.1.17-13.3.55.ppc", "3AS:cups-devel-1:1.1.17-13.3.55.s390", "3AS:cups-devel-1:1.1.17-13.3.55.s390x", "3AS:cups-devel-1:1.1.17-13.3.55.x86_64", "3AS:cups-libs-1:1.1.17-13.3.55.i386", "3AS:cups-libs-1:1.1.17-13.3.55.ia64", "3AS:cups-libs-1:1.1.17-13.3.55.ppc", "3AS:cups-libs-1:1.1.17-13.3.55.ppc64", "3AS:cups-libs-1:1.1.17-13.3.55.s390", "3AS:cups-libs-1:1.1.17-13.3.55.s390x", "3AS:cups-libs-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-1:1.1.17-13.3.55.i386", "3Desktop:cups-1:1.1.17-13.3.55.ia64", "3Desktop:cups-1:1.1.17-13.3.55.ppc", "3Desktop:cups-1:1.1.17-13.3.55.s390", "3Desktop:cups-1:1.1.17-13.3.55.s390x", "3Desktop:cups-1:1.1.17-13.3.55.src", "3Desktop:cups-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.55.i386", "3Desktop:cups-devel-1:1.1.17-13.3.55.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.55.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.55.s390", "3Desktop:cups-devel-1:1.1.17-13.3.55.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.55.i386", "3Desktop:cups-libs-1:1.1.17-13.3.55.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.55.s390", "3Desktop:cups-libs-1:1.1.17-13.3.55.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.55.x86_64", "3ES:cups-1:1.1.17-13.3.55.i386", "3ES:cups-1:1.1.17-13.3.55.ia64", "3ES:cups-1:1.1.17-13.3.55.ppc", "3ES:cups-1:1.1.17-13.3.55.s390", "3ES:cups-1:1.1.17-13.3.55.s390x", "3ES:cups-1:1.1.17-13.3.55.src", "3ES:cups-1:1.1.17-13.3.55.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3ES:cups-devel-1:1.1.17-13.3.55.i386", "3ES:cups-devel-1:1.1.17-13.3.55.ia64", "3ES:cups-devel-1:1.1.17-13.3.55.ppc", "3ES:cups-devel-1:1.1.17-13.3.55.s390", "3ES:cups-devel-1:1.1.17-13.3.55.s390x", "3ES:cups-devel-1:1.1.17-13.3.55.x86_64", "3ES:cups-libs-1:1.1.17-13.3.55.i386", "3ES:cups-libs-1:1.1.17-13.3.55.ia64", "3ES:cups-libs-1:1.1.17-13.3.55.ppc", "3ES:cups-libs-1:1.1.17-13.3.55.ppc64", "3ES:cups-libs-1:1.1.17-13.3.55.s390", "3ES:cups-libs-1:1.1.17-13.3.55.s390x", "3ES:cups-libs-1:1.1.17-13.3.55.x86_64", "3WS:cups-1:1.1.17-13.3.55.i386", "3WS:cups-1:1.1.17-13.3.55.ia64", "3WS:cups-1:1.1.17-13.3.55.ppc", "3WS:cups-1:1.1.17-13.3.55.s390", "3WS:cups-1:1.1.17-13.3.55.s390x", "3WS:cups-1:1.1.17-13.3.55.src", "3WS:cups-1:1.1.17-13.3.55.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3WS:cups-devel-1:1.1.17-13.3.55.i386", "3WS:cups-devel-1:1.1.17-13.3.55.ia64", "3WS:cups-devel-1:1.1.17-13.3.55.ppc", "3WS:cups-devel-1:1.1.17-13.3.55.s390", "3WS:cups-devel-1:1.1.17-13.3.55.s390x", "3WS:cups-devel-1:1.1.17-13.3.55.x86_64", "3WS:cups-libs-1:1.1.17-13.3.55.i386", "3WS:cups-libs-1:1.1.17-13.3.55.ia64", "3WS:cups-libs-1:1.1.17-13.3.55.ppc", "3WS:cups-libs-1:1.1.17-13.3.55.ppc64", "3WS:cups-libs-1:1.1.17-13.3.55.s390", "3WS:cups-libs-1:1.1.17-13.3.55.s390x", "3WS:cups-libs-1:1.1.17-13.3.55.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-5286" }, { "category": "external", "summary": "RHBZ#473905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5286", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5286" } ], "release_date": "2008-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-12-15T13:20:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:cups-1:1.1.17-13.3.55.i386", "3AS:cups-1:1.1.17-13.3.55.ia64", "3AS:cups-1:1.1.17-13.3.55.ppc", "3AS:cups-1:1.1.17-13.3.55.s390", "3AS:cups-1:1.1.17-13.3.55.s390x", "3AS:cups-1:1.1.17-13.3.55.src", "3AS:cups-1:1.1.17-13.3.55.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3AS:cups-devel-1:1.1.17-13.3.55.i386", "3AS:cups-devel-1:1.1.17-13.3.55.ia64", "3AS:cups-devel-1:1.1.17-13.3.55.ppc", "3AS:cups-devel-1:1.1.17-13.3.55.s390", "3AS:cups-devel-1:1.1.17-13.3.55.s390x", "3AS:cups-devel-1:1.1.17-13.3.55.x86_64", "3AS:cups-libs-1:1.1.17-13.3.55.i386", "3AS:cups-libs-1:1.1.17-13.3.55.ia64", "3AS:cups-libs-1:1.1.17-13.3.55.ppc", "3AS:cups-libs-1:1.1.17-13.3.55.ppc64", "3AS:cups-libs-1:1.1.17-13.3.55.s390", "3AS:cups-libs-1:1.1.17-13.3.55.s390x", "3AS:cups-libs-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-1:1.1.17-13.3.55.i386", "3Desktop:cups-1:1.1.17-13.3.55.ia64", "3Desktop:cups-1:1.1.17-13.3.55.ppc", "3Desktop:cups-1:1.1.17-13.3.55.s390", "3Desktop:cups-1:1.1.17-13.3.55.s390x", "3Desktop:cups-1:1.1.17-13.3.55.src", "3Desktop:cups-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.55.i386", "3Desktop:cups-devel-1:1.1.17-13.3.55.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.55.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.55.s390", "3Desktop:cups-devel-1:1.1.17-13.3.55.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.55.i386", "3Desktop:cups-libs-1:1.1.17-13.3.55.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.55.s390", "3Desktop:cups-libs-1:1.1.17-13.3.55.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.55.x86_64", "3ES:cups-1:1.1.17-13.3.55.i386", "3ES:cups-1:1.1.17-13.3.55.ia64", "3ES:cups-1:1.1.17-13.3.55.ppc", "3ES:cups-1:1.1.17-13.3.55.s390", "3ES:cups-1:1.1.17-13.3.55.s390x", "3ES:cups-1:1.1.17-13.3.55.src", "3ES:cups-1:1.1.17-13.3.55.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3ES:cups-devel-1:1.1.17-13.3.55.i386", "3ES:cups-devel-1:1.1.17-13.3.55.ia64", "3ES:cups-devel-1:1.1.17-13.3.55.ppc", "3ES:cups-devel-1:1.1.17-13.3.55.s390", "3ES:cups-devel-1:1.1.17-13.3.55.s390x", "3ES:cups-devel-1:1.1.17-13.3.55.x86_64", "3ES:cups-libs-1:1.1.17-13.3.55.i386", "3ES:cups-libs-1:1.1.17-13.3.55.ia64", "3ES:cups-libs-1:1.1.17-13.3.55.ppc", "3ES:cups-libs-1:1.1.17-13.3.55.ppc64", "3ES:cups-libs-1:1.1.17-13.3.55.s390", "3ES:cups-libs-1:1.1.17-13.3.55.s390x", "3ES:cups-libs-1:1.1.17-13.3.55.x86_64", "3WS:cups-1:1.1.17-13.3.55.i386", "3WS:cups-1:1.1.17-13.3.55.ia64", "3WS:cups-1:1.1.17-13.3.55.ppc", "3WS:cups-1:1.1.17-13.3.55.s390", "3WS:cups-1:1.1.17-13.3.55.s390x", "3WS:cups-1:1.1.17-13.3.55.src", "3WS:cups-1:1.1.17-13.3.55.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3WS:cups-devel-1:1.1.17-13.3.55.i386", "3WS:cups-devel-1:1.1.17-13.3.55.ia64", "3WS:cups-devel-1:1.1.17-13.3.55.ppc", "3WS:cups-devel-1:1.1.17-13.3.55.s390", "3WS:cups-devel-1:1.1.17-13.3.55.s390x", "3WS:cups-devel-1:1.1.17-13.3.55.x86_64", "3WS:cups-libs-1:1.1.17-13.3.55.i386", "3WS:cups-libs-1:1.1.17-13.3.55.ia64", "3WS:cups-libs-1:1.1.17-13.3.55.ppc", "3WS:cups-libs-1:1.1.17-13.3.55.ppc64", "3WS:cups-libs-1:1.1.17-13.3.55.s390", "3WS:cups-libs-1:1.1.17-13.3.55.s390x", "3WS:cups-libs-1:1.1.17-13.3.55.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:1028" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cups: Incomplete fix for CVE-2008-1722" } ] }
rhsa-2008_1028
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated cups packages that fix a security issue are now available for Red\nHat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Common UNIX\u00ae Printing System (CUPS) provides a portable printing layer\nfor UNIX operating systems.\n\nAn integer overflow flaw, leading to a heap buffer overflow, was discovered\nin the Portable Network Graphics (PNG) decoding routines used by the CUPS\nimage-converting filters, \"imagetops\" and \"imagetoraster\". An attacker\ncould create a malicious PNG file that could, potentially, execute\narbitrary code as the \"lp\" user if the file was printed. (CVE-2008-5286)\n\nCUPS users should upgrade to these updated packages, which contain a\nbackported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:1028", "url": "https://access.redhat.com/errata/RHSA-2008:1028" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "473905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473905" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_1028.json" } ], "title": "Red Hat Security Advisory: cups security update", "tracking": { "current_release_date": "2024-11-22T02:24:21+00:00", "generator": { "date": "2024-11-22T02:24:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:1028", "initial_release_date": "2008-12-15T13:20:00+00:00", "revision_history": [ { "date": "2008-12-15T13:20:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-12-15T08:22:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:24:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.ia64", "product": { "name": "cups-1:1.1.17-13.3.55.ia64", "product_id": "cups-1:1.1.17-13.3.55.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.ia64", "product": { "name": "cups-libs-1:1.1.17-13.3.55.ia64", "product_id": "cups-libs-1:1.1.17-13.3.55.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.ia64", "product": { "name": "cups-devel-1:1.1.17-13.3.55.ia64", "product_id": "cups-devel-1:1.1.17-13.3.55.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=ia64\u0026epoch=1" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.i386", "product": { "name": "cups-libs-1:1.1.17-13.3.55.i386", "product_id": "cups-libs-1:1.1.17-13.3.55.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.i386", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.i386", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.i386", "product": { "name": "cups-1:1.1.17-13.3.55.i386", "product_id": "cups-1:1.1.17-13.3.55.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.i386", "product": { "name": "cups-devel-1:1.1.17-13.3.55.i386", "product_id": "cups-devel-1:1.1.17-13.3.55.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.src", "product": { "name": "cups-1:1.1.17-13.3.55.src", "product_id": "cups-1:1.1.17-13.3.55.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.x86_64", "product": { "name": "cups-1:1.1.17-13.3.55.x86_64", "product_id": "cups-1:1.1.17-13.3.55.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.x86_64", "product": { "name": "cups-libs-1:1.1.17-13.3.55.x86_64", "product_id": "cups-libs-1:1.1.17-13.3.55.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.x86_64", "product": { "name": "cups-devel-1:1.1.17-13.3.55.x86_64", "product_id": "cups-devel-1:1.1.17-13.3.55.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.ppc", "product": { "name": "cups-1:1.1.17-13.3.55.ppc", "product_id": "cups-1:1.1.17-13.3.55.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.ppc", "product": { "name": "cups-libs-1:1.1.17-13.3.55.ppc", "product_id": "cups-libs-1:1.1.17-13.3.55.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.ppc", "product": { "name": "cups-devel-1:1.1.17-13.3.55.ppc", "product_id": "cups-devel-1:1.1.17-13.3.55.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.ppc64", "product": { "name": "cups-libs-1:1.1.17-13.3.55.ppc64", "product_id": "cups-libs-1:1.1.17-13.3.55.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.s390x", "product": { "name": "cups-1:1.1.17-13.3.55.s390x", "product_id": "cups-1:1.1.17-13.3.55.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.s390x", "product": { "name": "cups-libs-1:1.1.17-13.3.55.s390x", "product_id": "cups-libs-1:1.1.17-13.3.55.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.s390x", "product": { "name": "cups-devel-1:1.1.17-13.3.55.s390x", "product_id": "cups-devel-1:1.1.17-13.3.55.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.s390", "product": { "name": "cups-libs-1:1.1.17-13.3.55.s390", "product_id": "cups-libs-1:1.1.17-13.3.55.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.s390", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.s390", "product": { "name": "cups-1:1.1.17-13.3.55.s390", "product_id": "cups-1:1.1.17-13.3.55.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.s390", "product": { "name": "cups-devel-1:1.1.17-13.3.55.s390", "product_id": "cups-devel-1:1.1.17-13.3.55.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.src" }, "product_reference": "cups-1:1.1.17-13.3.55.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.src" }, "product_reference": "cups-1:1.1.17-13.3.55.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.src" }, "product_reference": "cups-1:1.1.17-13.3.55.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.src" }, "product_reference": "cups-1:1.1.17-13.3.55.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-5286", "discovery_date": "2008-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "473905" } ], "notes": [ { "category": "description", "text": "Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: Incomplete fix for CVE-2008-1722", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:cups-1:1.1.17-13.3.55.i386", "3AS:cups-1:1.1.17-13.3.55.ia64", "3AS:cups-1:1.1.17-13.3.55.ppc", "3AS:cups-1:1.1.17-13.3.55.s390", "3AS:cups-1:1.1.17-13.3.55.s390x", "3AS:cups-1:1.1.17-13.3.55.src", "3AS:cups-1:1.1.17-13.3.55.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3AS:cups-devel-1:1.1.17-13.3.55.i386", "3AS:cups-devel-1:1.1.17-13.3.55.ia64", "3AS:cups-devel-1:1.1.17-13.3.55.ppc", "3AS:cups-devel-1:1.1.17-13.3.55.s390", "3AS:cups-devel-1:1.1.17-13.3.55.s390x", "3AS:cups-devel-1:1.1.17-13.3.55.x86_64", "3AS:cups-libs-1:1.1.17-13.3.55.i386", "3AS:cups-libs-1:1.1.17-13.3.55.ia64", "3AS:cups-libs-1:1.1.17-13.3.55.ppc", "3AS:cups-libs-1:1.1.17-13.3.55.ppc64", "3AS:cups-libs-1:1.1.17-13.3.55.s390", "3AS:cups-libs-1:1.1.17-13.3.55.s390x", "3AS:cups-libs-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-1:1.1.17-13.3.55.i386", "3Desktop:cups-1:1.1.17-13.3.55.ia64", "3Desktop:cups-1:1.1.17-13.3.55.ppc", "3Desktop:cups-1:1.1.17-13.3.55.s390", "3Desktop:cups-1:1.1.17-13.3.55.s390x", "3Desktop:cups-1:1.1.17-13.3.55.src", "3Desktop:cups-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.55.i386", "3Desktop:cups-devel-1:1.1.17-13.3.55.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.55.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.55.s390", "3Desktop:cups-devel-1:1.1.17-13.3.55.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.55.i386", "3Desktop:cups-libs-1:1.1.17-13.3.55.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.55.s390", "3Desktop:cups-libs-1:1.1.17-13.3.55.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.55.x86_64", "3ES:cups-1:1.1.17-13.3.55.i386", "3ES:cups-1:1.1.17-13.3.55.ia64", "3ES:cups-1:1.1.17-13.3.55.ppc", "3ES:cups-1:1.1.17-13.3.55.s390", "3ES:cups-1:1.1.17-13.3.55.s390x", "3ES:cups-1:1.1.17-13.3.55.src", "3ES:cups-1:1.1.17-13.3.55.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3ES:cups-devel-1:1.1.17-13.3.55.i386", "3ES:cups-devel-1:1.1.17-13.3.55.ia64", "3ES:cups-devel-1:1.1.17-13.3.55.ppc", "3ES:cups-devel-1:1.1.17-13.3.55.s390", "3ES:cups-devel-1:1.1.17-13.3.55.s390x", "3ES:cups-devel-1:1.1.17-13.3.55.x86_64", "3ES:cups-libs-1:1.1.17-13.3.55.i386", "3ES:cups-libs-1:1.1.17-13.3.55.ia64", "3ES:cups-libs-1:1.1.17-13.3.55.ppc", "3ES:cups-libs-1:1.1.17-13.3.55.ppc64", "3ES:cups-libs-1:1.1.17-13.3.55.s390", "3ES:cups-libs-1:1.1.17-13.3.55.s390x", "3ES:cups-libs-1:1.1.17-13.3.55.x86_64", "3WS:cups-1:1.1.17-13.3.55.i386", "3WS:cups-1:1.1.17-13.3.55.ia64", "3WS:cups-1:1.1.17-13.3.55.ppc", "3WS:cups-1:1.1.17-13.3.55.s390", "3WS:cups-1:1.1.17-13.3.55.s390x", "3WS:cups-1:1.1.17-13.3.55.src", "3WS:cups-1:1.1.17-13.3.55.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3WS:cups-devel-1:1.1.17-13.3.55.i386", "3WS:cups-devel-1:1.1.17-13.3.55.ia64", "3WS:cups-devel-1:1.1.17-13.3.55.ppc", "3WS:cups-devel-1:1.1.17-13.3.55.s390", "3WS:cups-devel-1:1.1.17-13.3.55.s390x", "3WS:cups-devel-1:1.1.17-13.3.55.x86_64", "3WS:cups-libs-1:1.1.17-13.3.55.i386", "3WS:cups-libs-1:1.1.17-13.3.55.ia64", "3WS:cups-libs-1:1.1.17-13.3.55.ppc", "3WS:cups-libs-1:1.1.17-13.3.55.ppc64", "3WS:cups-libs-1:1.1.17-13.3.55.s390", "3WS:cups-libs-1:1.1.17-13.3.55.s390x", "3WS:cups-libs-1:1.1.17-13.3.55.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-5286" }, { "category": "external", "summary": "RHBZ#473905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5286", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5286" } ], "release_date": "2008-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-12-15T13:20:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:cups-1:1.1.17-13.3.55.i386", "3AS:cups-1:1.1.17-13.3.55.ia64", "3AS:cups-1:1.1.17-13.3.55.ppc", "3AS:cups-1:1.1.17-13.3.55.s390", "3AS:cups-1:1.1.17-13.3.55.s390x", "3AS:cups-1:1.1.17-13.3.55.src", "3AS:cups-1:1.1.17-13.3.55.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3AS:cups-devel-1:1.1.17-13.3.55.i386", "3AS:cups-devel-1:1.1.17-13.3.55.ia64", "3AS:cups-devel-1:1.1.17-13.3.55.ppc", "3AS:cups-devel-1:1.1.17-13.3.55.s390", "3AS:cups-devel-1:1.1.17-13.3.55.s390x", "3AS:cups-devel-1:1.1.17-13.3.55.x86_64", "3AS:cups-libs-1:1.1.17-13.3.55.i386", "3AS:cups-libs-1:1.1.17-13.3.55.ia64", "3AS:cups-libs-1:1.1.17-13.3.55.ppc", "3AS:cups-libs-1:1.1.17-13.3.55.ppc64", "3AS:cups-libs-1:1.1.17-13.3.55.s390", "3AS:cups-libs-1:1.1.17-13.3.55.s390x", "3AS:cups-libs-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-1:1.1.17-13.3.55.i386", "3Desktop:cups-1:1.1.17-13.3.55.ia64", "3Desktop:cups-1:1.1.17-13.3.55.ppc", "3Desktop:cups-1:1.1.17-13.3.55.s390", "3Desktop:cups-1:1.1.17-13.3.55.s390x", "3Desktop:cups-1:1.1.17-13.3.55.src", "3Desktop:cups-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.55.i386", "3Desktop:cups-devel-1:1.1.17-13.3.55.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.55.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.55.s390", "3Desktop:cups-devel-1:1.1.17-13.3.55.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.55.i386", "3Desktop:cups-libs-1:1.1.17-13.3.55.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.55.s390", "3Desktop:cups-libs-1:1.1.17-13.3.55.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.55.x86_64", "3ES:cups-1:1.1.17-13.3.55.i386", "3ES:cups-1:1.1.17-13.3.55.ia64", "3ES:cups-1:1.1.17-13.3.55.ppc", "3ES:cups-1:1.1.17-13.3.55.s390", "3ES:cups-1:1.1.17-13.3.55.s390x", "3ES:cups-1:1.1.17-13.3.55.src", "3ES:cups-1:1.1.17-13.3.55.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3ES:cups-devel-1:1.1.17-13.3.55.i386", "3ES:cups-devel-1:1.1.17-13.3.55.ia64", "3ES:cups-devel-1:1.1.17-13.3.55.ppc", "3ES:cups-devel-1:1.1.17-13.3.55.s390", "3ES:cups-devel-1:1.1.17-13.3.55.s390x", "3ES:cups-devel-1:1.1.17-13.3.55.x86_64", "3ES:cups-libs-1:1.1.17-13.3.55.i386", "3ES:cups-libs-1:1.1.17-13.3.55.ia64", "3ES:cups-libs-1:1.1.17-13.3.55.ppc", "3ES:cups-libs-1:1.1.17-13.3.55.ppc64", "3ES:cups-libs-1:1.1.17-13.3.55.s390", "3ES:cups-libs-1:1.1.17-13.3.55.s390x", "3ES:cups-libs-1:1.1.17-13.3.55.x86_64", "3WS:cups-1:1.1.17-13.3.55.i386", "3WS:cups-1:1.1.17-13.3.55.ia64", "3WS:cups-1:1.1.17-13.3.55.ppc", "3WS:cups-1:1.1.17-13.3.55.s390", "3WS:cups-1:1.1.17-13.3.55.s390x", "3WS:cups-1:1.1.17-13.3.55.src", "3WS:cups-1:1.1.17-13.3.55.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3WS:cups-devel-1:1.1.17-13.3.55.i386", "3WS:cups-devel-1:1.1.17-13.3.55.ia64", "3WS:cups-devel-1:1.1.17-13.3.55.ppc", "3WS:cups-devel-1:1.1.17-13.3.55.s390", "3WS:cups-devel-1:1.1.17-13.3.55.s390x", "3WS:cups-devel-1:1.1.17-13.3.55.x86_64", "3WS:cups-libs-1:1.1.17-13.3.55.i386", "3WS:cups-libs-1:1.1.17-13.3.55.ia64", "3WS:cups-libs-1:1.1.17-13.3.55.ppc", "3WS:cups-libs-1:1.1.17-13.3.55.ppc64", "3WS:cups-libs-1:1.1.17-13.3.55.s390", "3WS:cups-libs-1:1.1.17-13.3.55.s390x", "3WS:cups-libs-1:1.1.17-13.3.55.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:1028" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cups: Incomplete fix for CVE-2008-1722" } ] }
rhsa-2008:1028
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated cups packages that fix a security issue are now available for Red\nHat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Common UNIX\u00ae Printing System (CUPS) provides a portable printing layer\nfor UNIX operating systems.\n\nAn integer overflow flaw, leading to a heap buffer overflow, was discovered\nin the Portable Network Graphics (PNG) decoding routines used by the CUPS\nimage-converting filters, \"imagetops\" and \"imagetoraster\". An attacker\ncould create a malicious PNG file that could, potentially, execute\narbitrary code as the \"lp\" user if the file was printed. (CVE-2008-5286)\n\nCUPS users should upgrade to these updated packages, which contain a\nbackported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:1028", "url": "https://access.redhat.com/errata/RHSA-2008:1028" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "473905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473905" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_1028.json" } ], "title": "Red Hat Security Advisory: cups security update", "tracking": { "current_release_date": "2024-11-22T02:24:21+00:00", "generator": { "date": "2024-11-22T02:24:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:1028", "initial_release_date": "2008-12-15T13:20:00+00:00", "revision_history": [ { "date": "2008-12-15T13:20:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-12-15T08:22:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:24:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.ia64", "product": { "name": "cups-1:1.1.17-13.3.55.ia64", "product_id": "cups-1:1.1.17-13.3.55.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.ia64", "product": { "name": "cups-libs-1:1.1.17-13.3.55.ia64", "product_id": "cups-libs-1:1.1.17-13.3.55.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.ia64", "product": { "name": "cups-devel-1:1.1.17-13.3.55.ia64", "product_id": "cups-devel-1:1.1.17-13.3.55.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=ia64\u0026epoch=1" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.i386", "product": { "name": "cups-libs-1:1.1.17-13.3.55.i386", "product_id": "cups-libs-1:1.1.17-13.3.55.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.i386", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.i386", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.i386", "product": { "name": "cups-1:1.1.17-13.3.55.i386", "product_id": "cups-1:1.1.17-13.3.55.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.i386", "product": { "name": "cups-devel-1:1.1.17-13.3.55.i386", "product_id": "cups-devel-1:1.1.17-13.3.55.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.src", "product": { "name": "cups-1:1.1.17-13.3.55.src", "product_id": "cups-1:1.1.17-13.3.55.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.x86_64", "product": { "name": "cups-1:1.1.17-13.3.55.x86_64", "product_id": "cups-1:1.1.17-13.3.55.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.x86_64", "product": { "name": "cups-libs-1:1.1.17-13.3.55.x86_64", "product_id": "cups-libs-1:1.1.17-13.3.55.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.x86_64", "product": { "name": "cups-devel-1:1.1.17-13.3.55.x86_64", "product_id": "cups-devel-1:1.1.17-13.3.55.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.ppc", "product": { "name": "cups-1:1.1.17-13.3.55.ppc", "product_id": "cups-1:1.1.17-13.3.55.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.ppc", "product": { "name": "cups-libs-1:1.1.17-13.3.55.ppc", "product_id": "cups-libs-1:1.1.17-13.3.55.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.ppc", "product": { "name": "cups-devel-1:1.1.17-13.3.55.ppc", "product_id": "cups-devel-1:1.1.17-13.3.55.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.ppc64", "product": { "name": "cups-libs-1:1.1.17-13.3.55.ppc64", "product_id": "cups-libs-1:1.1.17-13.3.55.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.s390x", "product": { "name": "cups-1:1.1.17-13.3.55.s390x", "product_id": "cups-1:1.1.17-13.3.55.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.s390x", "product": { "name": "cups-libs-1:1.1.17-13.3.55.s390x", "product_id": "cups-libs-1:1.1.17-13.3.55.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.s390x", "product": { "name": "cups-devel-1:1.1.17-13.3.55.s390x", "product_id": "cups-devel-1:1.1.17-13.3.55.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.55.s390", "product": { "name": "cups-libs-1:1.1.17-13.3.55.s390", "product_id": "cups-libs-1:1.1.17-13.3.55.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.55?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.55.s390", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390", "product_id": "cups-debuginfo-1:1.1.17-13.3.55.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.55?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.55.s390", "product": { "name": "cups-1:1.1.17-13.3.55.s390", "product_id": "cups-1:1.1.17-13.3.55.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.55?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.55.s390", "product": { "name": "cups-devel-1:1.1.17-13.3.55.s390", "product_id": "cups-devel-1:1.1.17-13.3.55.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.55?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.src" }, "product_reference": "cups-1:1.1.17-13.3.55.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.src" }, "product_reference": "cups-1:1.1.17-13.3.55.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.src" }, "product_reference": "cups-1:1.1.17-13.3.55.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.src" }, "product_reference": "cups-1:1.1.17-13.3.55.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.55.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.55.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.55.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-5286", "discovery_date": "2008-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "473905" } ], "notes": [ { "category": "description", "text": "Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: Incomplete fix for CVE-2008-1722", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:cups-1:1.1.17-13.3.55.i386", "3AS:cups-1:1.1.17-13.3.55.ia64", "3AS:cups-1:1.1.17-13.3.55.ppc", "3AS:cups-1:1.1.17-13.3.55.s390", "3AS:cups-1:1.1.17-13.3.55.s390x", "3AS:cups-1:1.1.17-13.3.55.src", "3AS:cups-1:1.1.17-13.3.55.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3AS:cups-devel-1:1.1.17-13.3.55.i386", "3AS:cups-devel-1:1.1.17-13.3.55.ia64", "3AS:cups-devel-1:1.1.17-13.3.55.ppc", "3AS:cups-devel-1:1.1.17-13.3.55.s390", "3AS:cups-devel-1:1.1.17-13.3.55.s390x", "3AS:cups-devel-1:1.1.17-13.3.55.x86_64", "3AS:cups-libs-1:1.1.17-13.3.55.i386", "3AS:cups-libs-1:1.1.17-13.3.55.ia64", "3AS:cups-libs-1:1.1.17-13.3.55.ppc", "3AS:cups-libs-1:1.1.17-13.3.55.ppc64", "3AS:cups-libs-1:1.1.17-13.3.55.s390", "3AS:cups-libs-1:1.1.17-13.3.55.s390x", "3AS:cups-libs-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-1:1.1.17-13.3.55.i386", "3Desktop:cups-1:1.1.17-13.3.55.ia64", "3Desktop:cups-1:1.1.17-13.3.55.ppc", "3Desktop:cups-1:1.1.17-13.3.55.s390", "3Desktop:cups-1:1.1.17-13.3.55.s390x", "3Desktop:cups-1:1.1.17-13.3.55.src", "3Desktop:cups-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.55.i386", "3Desktop:cups-devel-1:1.1.17-13.3.55.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.55.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.55.s390", "3Desktop:cups-devel-1:1.1.17-13.3.55.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.55.i386", "3Desktop:cups-libs-1:1.1.17-13.3.55.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.55.s390", "3Desktop:cups-libs-1:1.1.17-13.3.55.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.55.x86_64", "3ES:cups-1:1.1.17-13.3.55.i386", "3ES:cups-1:1.1.17-13.3.55.ia64", "3ES:cups-1:1.1.17-13.3.55.ppc", "3ES:cups-1:1.1.17-13.3.55.s390", "3ES:cups-1:1.1.17-13.3.55.s390x", "3ES:cups-1:1.1.17-13.3.55.src", "3ES:cups-1:1.1.17-13.3.55.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3ES:cups-devel-1:1.1.17-13.3.55.i386", "3ES:cups-devel-1:1.1.17-13.3.55.ia64", "3ES:cups-devel-1:1.1.17-13.3.55.ppc", "3ES:cups-devel-1:1.1.17-13.3.55.s390", "3ES:cups-devel-1:1.1.17-13.3.55.s390x", "3ES:cups-devel-1:1.1.17-13.3.55.x86_64", "3ES:cups-libs-1:1.1.17-13.3.55.i386", "3ES:cups-libs-1:1.1.17-13.3.55.ia64", "3ES:cups-libs-1:1.1.17-13.3.55.ppc", "3ES:cups-libs-1:1.1.17-13.3.55.ppc64", "3ES:cups-libs-1:1.1.17-13.3.55.s390", "3ES:cups-libs-1:1.1.17-13.3.55.s390x", "3ES:cups-libs-1:1.1.17-13.3.55.x86_64", "3WS:cups-1:1.1.17-13.3.55.i386", "3WS:cups-1:1.1.17-13.3.55.ia64", "3WS:cups-1:1.1.17-13.3.55.ppc", "3WS:cups-1:1.1.17-13.3.55.s390", "3WS:cups-1:1.1.17-13.3.55.s390x", "3WS:cups-1:1.1.17-13.3.55.src", "3WS:cups-1:1.1.17-13.3.55.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3WS:cups-devel-1:1.1.17-13.3.55.i386", "3WS:cups-devel-1:1.1.17-13.3.55.ia64", "3WS:cups-devel-1:1.1.17-13.3.55.ppc", "3WS:cups-devel-1:1.1.17-13.3.55.s390", "3WS:cups-devel-1:1.1.17-13.3.55.s390x", "3WS:cups-devel-1:1.1.17-13.3.55.x86_64", "3WS:cups-libs-1:1.1.17-13.3.55.i386", "3WS:cups-libs-1:1.1.17-13.3.55.ia64", "3WS:cups-libs-1:1.1.17-13.3.55.ppc", "3WS:cups-libs-1:1.1.17-13.3.55.ppc64", "3WS:cups-libs-1:1.1.17-13.3.55.s390", "3WS:cups-libs-1:1.1.17-13.3.55.s390x", "3WS:cups-libs-1:1.1.17-13.3.55.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-5286" }, { "category": "external", "summary": "RHBZ#473905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5286", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5286" } ], "release_date": "2008-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-12-15T13:20:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:cups-1:1.1.17-13.3.55.i386", "3AS:cups-1:1.1.17-13.3.55.ia64", "3AS:cups-1:1.1.17-13.3.55.ppc", "3AS:cups-1:1.1.17-13.3.55.s390", "3AS:cups-1:1.1.17-13.3.55.s390x", "3AS:cups-1:1.1.17-13.3.55.src", "3AS:cups-1:1.1.17-13.3.55.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3AS:cups-devel-1:1.1.17-13.3.55.i386", "3AS:cups-devel-1:1.1.17-13.3.55.ia64", "3AS:cups-devel-1:1.1.17-13.3.55.ppc", "3AS:cups-devel-1:1.1.17-13.3.55.s390", "3AS:cups-devel-1:1.1.17-13.3.55.s390x", "3AS:cups-devel-1:1.1.17-13.3.55.x86_64", "3AS:cups-libs-1:1.1.17-13.3.55.i386", "3AS:cups-libs-1:1.1.17-13.3.55.ia64", "3AS:cups-libs-1:1.1.17-13.3.55.ppc", "3AS:cups-libs-1:1.1.17-13.3.55.ppc64", "3AS:cups-libs-1:1.1.17-13.3.55.s390", "3AS:cups-libs-1:1.1.17-13.3.55.s390x", "3AS:cups-libs-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-1:1.1.17-13.3.55.i386", "3Desktop:cups-1:1.1.17-13.3.55.ia64", "3Desktop:cups-1:1.1.17-13.3.55.ppc", "3Desktop:cups-1:1.1.17-13.3.55.s390", "3Desktop:cups-1:1.1.17-13.3.55.s390x", "3Desktop:cups-1:1.1.17-13.3.55.src", "3Desktop:cups-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.55.i386", "3Desktop:cups-devel-1:1.1.17-13.3.55.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.55.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.55.s390", "3Desktop:cups-devel-1:1.1.17-13.3.55.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.55.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.55.i386", "3Desktop:cups-libs-1:1.1.17-13.3.55.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.55.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.55.s390", "3Desktop:cups-libs-1:1.1.17-13.3.55.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.55.x86_64", "3ES:cups-1:1.1.17-13.3.55.i386", "3ES:cups-1:1.1.17-13.3.55.ia64", "3ES:cups-1:1.1.17-13.3.55.ppc", "3ES:cups-1:1.1.17-13.3.55.s390", "3ES:cups-1:1.1.17-13.3.55.s390x", "3ES:cups-1:1.1.17-13.3.55.src", "3ES:cups-1:1.1.17-13.3.55.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3ES:cups-devel-1:1.1.17-13.3.55.i386", "3ES:cups-devel-1:1.1.17-13.3.55.ia64", "3ES:cups-devel-1:1.1.17-13.3.55.ppc", "3ES:cups-devel-1:1.1.17-13.3.55.s390", "3ES:cups-devel-1:1.1.17-13.3.55.s390x", "3ES:cups-devel-1:1.1.17-13.3.55.x86_64", "3ES:cups-libs-1:1.1.17-13.3.55.i386", "3ES:cups-libs-1:1.1.17-13.3.55.ia64", "3ES:cups-libs-1:1.1.17-13.3.55.ppc", "3ES:cups-libs-1:1.1.17-13.3.55.ppc64", "3ES:cups-libs-1:1.1.17-13.3.55.s390", "3ES:cups-libs-1:1.1.17-13.3.55.s390x", "3ES:cups-libs-1:1.1.17-13.3.55.x86_64", "3WS:cups-1:1.1.17-13.3.55.i386", "3WS:cups-1:1.1.17-13.3.55.ia64", "3WS:cups-1:1.1.17-13.3.55.ppc", "3WS:cups-1:1.1.17-13.3.55.s390", "3WS:cups-1:1.1.17-13.3.55.s390x", "3WS:cups-1:1.1.17-13.3.55.src", "3WS:cups-1:1.1.17-13.3.55.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.55.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.55.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.55.x86_64", "3WS:cups-devel-1:1.1.17-13.3.55.i386", "3WS:cups-devel-1:1.1.17-13.3.55.ia64", "3WS:cups-devel-1:1.1.17-13.3.55.ppc", "3WS:cups-devel-1:1.1.17-13.3.55.s390", "3WS:cups-devel-1:1.1.17-13.3.55.s390x", "3WS:cups-devel-1:1.1.17-13.3.55.x86_64", "3WS:cups-libs-1:1.1.17-13.3.55.i386", "3WS:cups-libs-1:1.1.17-13.3.55.ia64", "3WS:cups-libs-1:1.1.17-13.3.55.ppc", "3WS:cups-libs-1:1.1.17-13.3.55.ppc64", "3WS:cups-libs-1:1.1.17-13.3.55.s390", "3WS:cups-libs-1:1.1.17-13.3.55.s390x", "3WS:cups-libs-1:1.1.17-13.3.55.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:1028" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cups: Incomplete fix for CVE-2008-1722" } ] }
CVE-2008-5286
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
apple | cups | 1.1.17 | |
apple | cups | 1.1.18 | |
apple | cups | 1.1.19 | |
apple | cups | 1.1.19 | |
apple | cups | 1.1.19 | |
apple | cups | 1.1.19 | |
apple | cups | 1.1.19 | |
apple | cups | 1.1.19 | |
apple | cups | 1.1.20 | |
apple | cups | 1.1.20 | |
apple | cups | 1.1.20 | |
apple | cups | 1.1.20 | |
apple | cups | 1.1.20 | |
apple | cups | 1.1.20 | |
apple | cups | 1.1.20 | |
apple | cups | 1.1.21 | |
apple | cups | 1.1.21 | |
apple | cups | 1.1.21 | |
apple | cups | 1.1.22 | |
apple | cups | 1.1.22 | |
apple | cups | 1.1.22 | |
apple | cups | 1.1.23 | |
apple | cups | 1.1.23 | |
apple | cups | 1.2 | |
apple | cups | 1.2 | |
apple | cups | 1.2 | |
apple | cups | 1.2 | |
apple | cups | 1.2 | |
apple | cups | 1.2.0 | |
apple | cups | 1.2.1 | |
apple | cups | 1.2.2 | |
apple | cups | 1.2.3 | |
apple | cups | 1.2.4 | |
apple | cups | 1.2.5 | |
apple | cups | 1.2.6 | |
apple | cups | 1.2.7 | |
apple | cups | 1.2.8 | |
apple | cups | 1.2.9 | |
apple | cups | 1.2.10 | |
apple | cups | 1.2.11 | |
apple | cups | 1.2.12 | |
apple | cups | 1.3 | |
apple | cups | 1.3 | |
apple | cups | 1.3 | |
apple | cups | 1.3.0 | |
apple | cups | 1.3.1 | |
apple | cups | 1.3.2 | |
apple | cups | 1.3.3 | |
apple | cups | 1.3.4 | |
apple | cups | 1.3.5 | |
apple | cups | 1.3.6 | |
apple | cups | 1.3.7 | |
apple | cups | 1.3.8 | |
apple | cups | 1.3.9 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "8335D4E3-563D-4288-B708-A9635BCA595F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5279D055-248A-4BD1-9FBB-0024BA16DF5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "BF791C1D-9AF8-4F0F-8F4B-844BC9A55DFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "16519855-FCB9-44A8-9C7E-116192327BAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "B1D9330B-C51A-4C7D-A322-85103C64D86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "2DA0C19F-95EB-429C-AF06-A2C1D5643662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*", "matchCriteriaId": "225CCE80-FF4B-4B39-B8BD-EB4710047524", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*", "matchCriteriaId": "07925DD8-50C0-4908-95D1-7342A4617BBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "48A519DB-6C6D-4094-814D-33BD5EF389BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "B6ED7566-5092-4B08-97A9-B2B53117A224", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "98DCAC0C-896F-4353-A665-5BCD0D8AEBA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*", "matchCriteriaId": "E72614CD-8F70-4E07-AD83-8FDE8026CEC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*", "matchCriteriaId": "48E62419-C165-4B42-8C23-E24821BD4BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*", "matchCriteriaId": "217D804B-CA56-49CE-B9EB-2A297EB1763C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*", "matchCriteriaId": "A41E8583-C837-4871-B4D2-FD41C78D538E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D480C37B-0DA8-4096-80B0-5198FE589A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*", "matchCriteriaId": "74F5A83B-3C1A-49F3-A9D6-F7B9B897E447", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*", "matchCriteriaId": "241D4183-879D-4974-BACB-A6987EDA2E7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "96592A93-4967-4B91-BCF7-558DC472E7BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*", "matchCriteriaId": "8758715D-B973-4960-8B7D-6F9A11E73288", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*", "matchCriteriaId": "0370E9EB-B830-4362-B83C-912579695691", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "DA3EC6EE-720D-4F27-A2E1-88AE53FC41A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*", "matchCriteriaId": "D644926A-C2A5-45FE-85A3-2782CE87ED86", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*", "matchCriteriaId": "AFB34629-DB13-4164-8A18-BD818E50528B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*", "matchCriteriaId": "2D432471-B5FD-4B1D-82DF-6F3152752071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "960DE41E-63DB-45EB-9B19-6349BDA05086", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*", "matchCriteriaId": "A57D2299-3409-4907-9FC0-5C3C715CDB37", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*", "matchCriteriaId": "C7EB92FA-3669-4530-BE69-84CF01D98FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0696E675-0A13-45FC-8917-845E6FF7A311", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "78BAC98C-1FE6-42A3-8B62-E3C321914F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "BCC3EF2F-0140-4185-9FB3-2B595B61CDC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7C36785A-F735-45C0-986B-9624AD65F0C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "3C1D3916-607F-44E8-9D47-93C6C0789083", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "174613C3-A04B-4701-849B-BAA598BF4F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "81C1137C-BE3D-45F9-83C9-D212107F0E14", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "3CBC1F81-E93A-42A7-8BC8-4B903688F2E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "1FA876FF-C58A-45CF-A8E8-E2068DF79421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "5FD78771-BD9A-4AC2-B664-B189DD288FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "50A16424-732F-4B76-A753-1642A97BC1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "E189C976-2DD2-485C-828E-7FC3DC6A8F32", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "A86CA90F-A944-4F3E-B75F-8147125335D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*", "matchCriteriaId": "690C4DEC-1467-4D7D-8E73-6EE1758439D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "FB5CA96B-411E-47BE-81A1-1C2E240A25F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "AA5A29C9-1913-4B8F-B162-66E71BEABD1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "9FAFABDC-E40F-4C53-AC66-94EFD077665D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "42A2F7B3-F4A7-416E-A07F-D4C5F0768B6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F96C1B80-9E20-4832-8308-BF7911569EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "3F2D7DB3-F467-4BC0-83BB-4706D067A2C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "ABD33C2C-7D39-4CCE-AC99-BC7B1B205A4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "46C394DC-65A7-4713-B823-6F5D329A0C5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "E5E9F74F-3C7D-486A-8BA1-EE2A73160B39", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "69BD64BB-BDA7-4F82-8324-B7C7C941133C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "FCAEE03E-0B8A-4D10-BD4D-2DA25B7BBE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "7C671B95-8892-4D71-87FE-BABF5CBEC144", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow." }, { "lang": "es", "value": "Un desbordamiento de entero en la funci\u00f3n _cupsImageReadPNG en CUPS 1.1.17 hasta 1.3.9 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una imagen PNG con un gran valor de altura, lo cual impide una correcta comprobaci\u00f3n de validaci\u00f3n y ocasiona un desbordamiento de b\u00fafer." } ], "id": "CVE-2008-5286", "lastModified": "2024-11-21T00:53:44.217", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-12-01T15:30:03.640", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/32962" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/33101" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/33111" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/33568" }, { "source": "cve@mitre.org", "url": "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cups.org/str.php?L2974" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1677" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:028" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:029" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/12/01/1" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-1028.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/32518" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021298" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/3315" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46933" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/32962" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/33101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/33111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/33568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cups.org/str.php?L2974" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:029" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/12/01/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-1028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/32518" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021298" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/3315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2008-5286
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2008-5286", "description": "Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.", "id": "GSD-2008-5286", "references": [ "https://www.suse.com/security/cve/CVE-2008-5286.html", "https://www.debian.org/security/2008/dsa-1677", "https://access.redhat.com/errata/RHSA-2008:1028" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2008-5286" ], "details": "Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.", "id": "GSD-2008-5286", "modified": "2023-12-13T01:23:04.871691Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5286", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20081201 (sort of urgent) CVE Request -- cups (repost)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/12/01/1" }, { "name": "33101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33101" }, { "name": "32518", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32518" }, { "name": "GLSA-200812-11", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml" }, { "name": "oval:org.mitre.oval:def:10058", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058" }, { "name": "33111", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33111" }, { "name": "RHSA-2008:1028", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-1028.html" }, { "name": "http://www.cups.org/str.php?L2974", "refsource": "CONFIRM", "url": "http://www.cups.org/str.php?L2974" }, { "name": "GLSA-200812-01", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml" }, { "name": "MDVSA-2009:029", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:029" }, { "name": "SUSE-SR:2009:002", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html" }, { "name": "33568", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33568" }, { "name": "DSA-1677", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1677" }, { "name": "32962", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32962" }, { "name": "1021298", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021298" }, { "name": "ADV-2008-3315", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3315" }, { "name": "cups-cupsimagereadpng-overflow(46933)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46933" }, { "name": "MDVSA-2009:028", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:028" }, { "name": "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt", "refsource": "CONFIRM", "url": "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5286" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-189" } ] } ] }, "references": { "reference_data": [ { "name": "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt", "refsource": "CONFIRM", "tags": [], "url": "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt" }, { "name": "http://www.cups.org/str.php?L2974", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cups.org/str.php?L2974" }, { "name": "32518", "refsource": "BID", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/32518" }, { "name": "[oss-security] 20081201 (sort of urgent) CVE Request -- cups (repost)", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2008/12/01/1" }, { "name": "GLSA-200812-11", "refsource": "GENTOO", "tags": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml" }, { "name": "33101", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/33101" }, { "name": "RHSA-2008:1028", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-1028.html" }, { "name": "GLSA-200812-01", "refsource": "GENTOO", "tags": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml" }, { "name": "DSA-1677", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2008/dsa-1677" }, { "name": "32962", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/32962" }, { "name": "MDVSA-2009:028", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:028" }, { "name": "MDVSA-2009:029", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:029" }, { "name": "33568", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/33568" }, { "name": "SUSE-SR:2009:002", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html" }, { "name": "33111", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/33111" }, { "name": "1021298", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1021298" }, { "name": "ADV-2008-3315", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/3315" }, { "name": "cups-cupsimagereadpng-overflow(46933)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46933" }, { "name": "oval:org.mitre.oval:def:10058", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2017-09-29T01:32Z", "publishedDate": "2008-12-01T15:30Z" } } }
ghsa-wj8g-27x5-crw6
Vulnerability from github
Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.
{ "affected": [], "aliases": [ "CVE-2008-5286" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-12-01T15:30:00Z", "severity": "HIGH" }, "details": "Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.", "id": "GHSA-wj8g-27x5-crw6", "modified": "2022-05-17T00:44:58Z", "published": "2022-05-17T00:44:58Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5286" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46933" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/32962" }, { "type": "WEB", "url": "http://secunia.com/advisories/33101" }, { "type": "WEB", "url": "http://secunia.com/advisories/33111" }, { "type": "WEB", "url": "http://secunia.com/advisories/33568" }, { "type": "WEB", "url": "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt" }, { "type": "WEB", "url": "http://www.cups.org/str.php?L2974" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1677" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:028" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:029" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2008/12/01/1" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-1028.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/32518" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1021298" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/3315" } ], "schema_version": "1.4.0", "severity": [] }
var-200812-0322
Vulnerability from variot
Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow. Common Unix Printing System(CUPS)是一款通用Unix打印系统,是Unix环境下的跨平台打印解决方案,基于Internet打印协议,提供大多数PostScript和raster打印机服务. CUPS PNG过滤器的_cupsImageReadPNG()函数中执行了以下计算: bufsize = img->xsize * img->ysize * 3; if ((bufsize / (img->ysize * 3)) != img->xsize) { fprintf(stderr, \"DEBUG: PNG image dimensions (\%ux\%u) too large!\n\", (unsigned)width, (unsigned)height); fclose(fp); return (1); } 验证代码的img->ysize * 3可能会出现整数溢出,导致执行任意代码. CUPS is prone to an integer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied PNG image sizes before using them to allocate memory buffers. Successful exploits may allow attackers to execute arbitrary code with the privileges of a user running the utilities. Failed exploit attempts likely cause denial-of-service conditions. Versions prior to CUPS 1.3.10 are vulnerable. It is based on the Internet Printing Protocol and provides most PostScript and raster printer services.
For the stable distribution (etch) this problem has been fixed in version 1.2.7-4etch6.
For testing distribution (lenny) this issue will be fixed soon.
For the unstable distribution (sid) this problem has been fixed in version 1.3.8-1lenny4.
Upgrade Instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Source archives:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6.dsc
Size/MD5 checksum: 1092 a7198b7e0d7724a972d4027e805b1387
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6.diff.gz
Size/MD5 checksum: 108940 1321ea49cfa8c06d619759acb00b0b2e
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7.orig.tar.gz
Size/MD5 checksum: 4214272 c9ba33356e5bb93efbcf77b6e142e498
Architecture independent components:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-common_1.2.7-4etch6_all.deb
Size/MD5 checksum: 917900 4abe699f9d2a8f866b1e323934c6172a
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.2.7-4etch6_all.deb
Size/MD5 checksum: 46256 9e98540d35e8a7aef76a1042cc4befe4
Alpha architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_alpha.deb
Size/MD5 checksum: 1614646 18542415a7a35563aacf6baccc2c474c
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_alpha.deb
Size/MD5 checksum: 39316 641f1871ea3d1e61a56dc009b2e58652
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_alpha.deb
Size/MD5 checksum: 85894 99a322067e2207a67afc55dccd5d63b4
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_alpha.deb
Size/MD5 checksum: 1092462 e2c0dd66dc9d52d41b7e179fa83908ab
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_alpha.deb
Size/MD5 checksum: 95658 51c76b87321a3c01dfe996fabad2de88
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_alpha.deb
Size/MD5 checksum: 72682 751a0c814ae40bf75b0494dafd19bd8e
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_alpha.deb
Size/MD5 checksum: 175346 f8701aeb6bc3670c3f1e60cc80c4ded7
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_alpha.deb
Size/MD5 checksum: 183712 42dc520b09c22f1d25b7ff1e6d7574bb
AMD64 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_amd64.deb
Size/MD5 checksum: 1576182 fe94635e099af684c654fb6468522f21
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_amd64.deb
Size/MD5 checksum: 36342 3e5954fdc1c572e86f2eeef93c1f466f
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_amd64.deb
Size/MD5 checksum: 80704 9a21d4104655094da5f2ff3a4c019a08
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_amd64.deb
Size/MD5 checksum: 1087506 cd83b8b030a4c972b1b3fa396114d9e9
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_amd64.deb
Size/MD5 checksum: 86360 aeed41809da68dc26e7c586e87878c45
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_amd64.deb
Size/MD5 checksum: 53008 9f8e3453367ef72e6ef6f00dc6baf624
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_amd64.deb
Size/MD5 checksum: 162608 a768dc52659411be6fd46b38df61d69b
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_amd64.deb
Size/MD5 checksum: 142546 a6caf31df81c4aea72c0abc9c0a0b1af
ARM architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_arm.deb
Size/MD5 checksum: 1569702 f7cd63fd8d10e8fcaea2649260b8437a
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_arm.deb
Size/MD5 checksum: 35934 e5a3e25422b8ded68767d8c32d9291f5
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_arm.deb
Size/MD5 checksum: 78916 f9707c6c35f2c3198892a8d82eecfa8b
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_arm.deb
Size/MD5 checksum: 1026248 79e9a9669d9d896d303e29ed7d2b7122
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_arm.deb
Size/MD5 checksum: 85540 45e25e1887e37f029a3a8da50b309fe4
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_arm.deb
Size/MD5 checksum: 48732 b90d30685f1e68a036a512cf331547e6
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_arm.deb
Size/MD5 checksum: 155278 1a0b8b93532c23d26866afc163689dd6
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_arm.deb
Size/MD5 checksum: 132032 5c4843fe297598ee3c618f92feaef93e
HP Precision architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_hppa.deb
Size/MD5 checksum: 1624116 e285d90e7861906f00f8e709cb3039ae
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_hppa.deb
Size/MD5 checksum: 39544 d3015a7ef0c7c345d3940a6c9f428cf0
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_hppa.deb
Size/MD5 checksum: 84804 a4fa9da96d848e7596d6e3d623fdef07
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_hppa.deb
Size/MD5 checksum: 1032854 ec6badd9fcff41974f425d97a0a12165
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_hppa.deb
Size/MD5 checksum: 92038 3dcbb10b949495e21fc742b9b42a3a84
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_hppa.deb
Size/MD5 checksum: 57376 e64d3d7a95c80c92602e3e7548998bc2
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_hppa.deb
Size/MD5 checksum: 171856 ab864167ddd2c8b4247898ed36059435
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_hppa.deb
Size/MD5 checksum: 153942 4149487b7dfd72b027de9851a4adb32e
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_i386.deb
Size/MD5 checksum: 1556170 c0cefa71d7f58abd666c2c1459d3ede9
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_i386.deb
Size/MD5 checksum: 36250 e464d81d46968426796a8182e6418691
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_i386.deb
Size/MD5 checksum: 79702 77c4aef7c78be537c09bc689ad1f5139
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_i386.deb
Size/MD5 checksum: 997624 ec73926b9d49c2790c6381a927ad20a2
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_i386.deb
Size/MD5 checksum: 87310 86517be38ba93afd954091ad5643c65b
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_i386.deb
Size/MD5 checksum: 53240 4fccf1dfd78b230033407a914760d3f5
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_i386.deb
Size/MD5 checksum: 161274 41344ee4c268c095b89c8decc0e2df68
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_i386.deb
Size/MD5 checksum: 137796 51b8758e0338e1ec6ec9d74ea5f960ef
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_ia64.deb
Size/MD5 checksum: 1771030 d4235a8ee49af176f27c8a097a696864
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_ia64.deb
Size/MD5 checksum: 46326 729ebfb9347d0463f7a6f5cc10c371e7
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_ia64.deb
Size/MD5 checksum: 106218 9a9142746bbca2c53644c084b45fea9c
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_ia64.deb
Size/MD5 checksum: 1108324 ea4f9d4d44e6b964c3793fd3a2862671
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_ia64.deb
Size/MD5 checksum: 107068 bab641470a0bf7034b9ebc7ae072d6fa
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_ia64.deb
Size/MD5 checksum: 74214 770441377ccf9ad422da6e9d3ba612eb
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_ia64.deb
Size/MD5 checksum: 204316 7df30a0f5661ea79cdcc537d4012b217
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_ia64.deb
Size/MD5 checksum: 192364 41d3bab218b036299f8ffae98a9008de
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_mips.deb
Size/MD5 checksum: 1567974 ba75b6ff260e84dd64b939cae9262a54
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_mips.deb
Size/MD5 checksum: 36112 6cae983101bdd812ff1f6f26169ab06a
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_mips.deb
Size/MD5 checksum: 76146 16b61a899c465fc7f142d97744dffba3
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_mips.deb
Size/MD5 checksum: 1098272 daa46352b0ad47b5c3061c42a15e6ddb
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_mips.deb
Size/MD5 checksum: 86920 dd75cd6ce9bd9ceaae7d39b60fda49c9
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_mips.deb
Size/MD5 checksum: 57690 32cfeb2301ded386cf4ab6d0127f30a3
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_mips.deb
Size/MD5 checksum: 158092 9abd9b0ce1dc1528b0ca50b5fbb7b78b
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_mips.deb
Size/MD5 checksum: 150986 149531690113d5333beaf1622f915037
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_mipsel.deb
Size/MD5 checksum: 1553596 a42820cf5bd8d46c4a5cab2a6bd0929a
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_mipsel.deb
Size/MD5 checksum: 36076 f7239a53b24df0813b16aac1efc850b7
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_mipsel.deb
Size/MD5 checksum: 77462 a60a8f2d6ab7958026585952890fc751
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_mipsel.deb
Size/MD5 checksum: 1085502 a18f21c9c0eff69d326bf42596d3ed32
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_mipsel.deb
Size/MD5 checksum: 87080 1b5618e9841ec899e63ee14cb36116d1
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_mipsel.deb
Size/MD5 checksum: 57848 def6826bc2876abfcf1b9ad01eea3546
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_mipsel.deb
Size/MD5 checksum: 158634 bc4151665423bb6acc3225d1f8017b50
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_mipsel.deb
Size/MD5 checksum: 150888 f27527d8e7d3b892f5e2dc7aa0776434
PowerPC architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_powerpc.deb
Size/MD5 checksum: 1576684 9c91771aea9ad144c56967ac8caf1fd5
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_powerpc.deb
Size/MD5 checksum: 41290 69d7ba1506a7415dc74621aa833edf59
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_powerpc.deb
Size/MD5 checksum: 89994 12245002a3f5e437921979cd8362d346
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_powerpc.deb
Size/MD5 checksum: 1143404 c79dd5b219961ded9d9dfebf2361fed0
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_powerpc.deb
Size/MD5 checksum: 88542 988f4b258fbdf870d51aacd1dd26b116
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_powerpc.deb
Size/MD5 checksum: 51880 650b5a80af7485308b6fca8a0453c9c0
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_powerpc.deb
Size/MD5 checksum: 163284 4fc43ad526d97ad3823524988c892851
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_powerpc.deb
Size/MD5 checksum: 136868 2e1cdfaf184170342520895e26ee84b1
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_s390.deb
Size/MD5 checksum: 1587456 5522fd1afaaa1105a51c91354783fd6f
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_s390.deb
Size/MD5 checksum: 37422 38b8fd3823381f4384f8758139f3d418
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_s390.deb
Size/MD5 checksum: 82336 55c8f39b3d04e0a127426f2daf89941f
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_s390.deb
Size/MD5 checksum: 1037274 02149d41988647e7f4de8e626801c588
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_s390.deb
Size/MD5 checksum: 88040 8c844af7aeb9c0e1ec9a093a537d5f91
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_s390.deb
Size/MD5 checksum: 52508 c3695c0157c8bba7eb2bc614173bcd0f
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_s390.deb
Size/MD5 checksum: 166802 1893c39f92d371c7b474d57f4d8c105e
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_s390.deb
Size/MD5 checksum: 144928 0eb6cdbc1deceb32bbf2c145a99f7d98
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_sparc.deb
Size/MD5 checksum: 1562538 0757006ce0c52845673d2cbe9fae0b38
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_sparc.deb
Size/MD5 checksum: 36020 27636d7df41cfef4c9e41ee236a9b308
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_sparc.deb
Size/MD5 checksum: 78518 174e3b09d2d667e01d0b47ecb06a2925
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_sparc.deb
Size/MD5 checksum: 992164 79a9729f9280b70aa7e8573636cfeb8c
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_sparc.deb
Size/MD5 checksum: 85368 4c3b851a551b47fed4229f55b8a0a4fe
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_sparc.deb
Size/MD5 checksum: 51756 d4406a58edf127974a79b0df75eab757
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_sparc.deb
Size/MD5 checksum: 159176 29057219279ea090cf47b35b1da416af
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_sparc.deb
Size/MD5 checksum: 139560 ca580a13d486d24f74c9a230efee6bde
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFJNaPhW5ql+IAeqTIRAiX7AJwJd3Szo5tvpYyBrqggsDuPSulvKACfVJsa EwALyW+6s+Lgp2d1GI2ong4= =R0SH -----END PGP SIGNATURE----- .
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.
Download and test it today: https://psi.secunia.com/
Read more about this new version: https://psi.secunia.com/?page=changelog
TITLE: CUPS "process_browse_data()" Double Free Vulnerability
SECUNIA ADVISORY ID: SA28994
VERIFY ADVISORY: http://secunia.com/advisories/28994/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From local network
SOFTWARE: CUPS 1.x http://secunia.com/product/921/
DESCRIPTION: A vulnerability has been discovered in CUPS, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.
The vulnerability is caused due to an error within the "process_browse_data()" function when adding printers and classes. This can be exploited to free the same buffer twice by sending specially crafted browser packets to the UDP port on which cupsd is listening (by default port 631/UDP).
The vulnerability is confirmed in version 1.3.5.
SOLUTION: Update to version 1.3.6.
PROVIDED AND/OR DISCOVERED BY: Reported as a CUPS bug by h.blischke.
ORIGINAL ADVISORY: http://www.cups.org/str.php?L2656
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2009:028 http://www.mandriva.com/security/
Package : cups Date : January 24, 2009 Affected: 2008.0, 2008.1
Problem Description:
Security vulnerabilities have been discovered and corrected in CUPS.
CUPS before 1.3.8 allows local users, and possibly remote attackers, to cause a denial of service (daemon crash) by adding a large number of RSS Subscriptions, which triggers a NULL pointer dereference (CVE-2008-5183).
The web interface (cgi-bin/admin.c) in CUPS before 1.3.8 uses the guest username when a user is not logged on to the web server, which makes it easier for remote attackers to bypass intended policy and conduct CSRF attacks via the (1) add and (2) cancel RSS subscription functions (CVE-2008-5184).
The updated packages have been patched to prevent this.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5183 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5184 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5286 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0032
Updated Packages:
Mandriva Linux 2008.0: 9ff1555139c59b89ea0623dfdfff4de5 2008.0/i586/cups-1.3.6-1.4mdv2008.0.i586.rpm 3cda60090d2108259f55cdbc6cf372e5 2008.0/i586/cups-common-1.3.6-1.4mdv2008.0.i586.rpm 1fbbbf89a0341cf430905757bdc6c355 2008.0/i586/cups-serial-1.3.6-1.4mdv2008.0.i586.rpm f6eb5a73b984f77e851cb39826ba26a1 2008.0/i586/libcups2-1.3.6-1.4mdv2008.0.i586.rpm e8279e8427ef9c3ec9536abe94038423 2008.0/i586/libcups2-devel-1.3.6-1.4mdv2008.0.i586.rpm 9974e6ad715a853706ec26acf9ca73c3 2008.0/i586/php-cups-1.3.6-1.4mdv2008.0.i586.rpm 6f6a298d7935094b6fcd18d39c3de1b7 2008.0/SRPMS/cups-1.3.6-1.4mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64: 355ce3cfb79a4aebbdabedb206a32e05 2008.0/x86_64/cups-1.3.6-1.4mdv2008.0.x86_64.rpm e3a2b95ac7138318d6cefab0fdf3face 2008.0/x86_64/cups-common-1.3.6-1.4mdv2008.0.x86_64.rpm fb0abf9e3d492edd06876b7d4cebe784 2008.0/x86_64/cups-serial-1.3.6-1.4mdv2008.0.x86_64.rpm 5b5196b27e24fb6ad910563ed884ce2e 2008.0/x86_64/lib64cups2-1.3.6-1.4mdv2008.0.x86_64.rpm e8b1cdbba7283ff2e9b76eb498f508d0 2008.0/x86_64/lib64cups2-devel-1.3.6-1.4mdv2008.0.x86_64.rpm 178ca59986af801a2c29611fa16ce2dd 2008.0/x86_64/php-cups-1.3.6-1.4mdv2008.0.x86_64.rpm 6f6a298d7935094b6fcd18d39c3de1b7 2008.0/SRPMS/cups-1.3.6-1.4mdv2008.0.src.rpm
Mandriva Linux 2008.1: 93a94c922f72f8844e232ed779a8c66c 2008.1/i586/cups-1.3.6-5.3mdv2008.1.i586.rpm eccb6a07dd53dbbeb490675c2cf311f0 2008.1/i586/cups-common-1.3.6-5.3mdv2008.1.i586.rpm 2ad9c7135f6d8a2217d34055ca8f57b3 2008.1/i586/cups-serial-1.3.6-5.3mdv2008.1.i586.rpm 62d4efcf07165da647db08d6636ac596 2008.1/i586/libcups2-1.3.6-5.3mdv2008.1.i586.rpm f0779950606ab9fa83b9de410a7beb70 2008.1/i586/libcups2-devel-1.3.6-5.3mdv2008.1.i586.rpm d0bd96dc1aec2dab736d538a7bd49a2b 2008.1/i586/php-cups-1.3.6-5.3mdv2008.1.i586.rpm abd1474014a74c467881ca52b4090ace 2008.1/SRPMS/cups-1.3.6-5.3mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64: 64aca60db93cd3886f58823155e2f982 2008.1/x86_64/cups-1.3.6-5.3mdv2008.1.x86_64.rpm 2cb2d9467430c4619ed23d37099ad2cc 2008.1/x86_64/cups-common-1.3.6-5.3mdv2008.1.x86_64.rpm 69b5f842144013c41c946783c898c1db 2008.1/x86_64/cups-serial-1.3.6-5.3mdv2008.1.x86_64.rpm 243a0d7da4c4e24ac8c7571a202e1627 2008.1/x86_64/lib64cups2-1.3.6-5.3mdv2008.1.x86_64.rpm 2d4bbbd60d026d3bc272001d447dc5ae 2008.1/x86_64/lib64cups2-devel-1.3.6-5.3mdv2008.1.x86_64.rpm e1a2d953fdc0dbb7eda2097f0e4c38e9 2008.1/x86_64/php-cups-1.3.6-5.3mdv2008.1.x86_64.rpm abd1474014a74c467881ca52b4090ace 2008.1/SRPMS/cups-1.3.6-5.3mdv2008.1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFJe0RhmqjQ0CJFipgRAsXFAKDBJeogydK5chEfSmEpHuVXDsC6xQCgq+vl JbRgydRjIpXNqGzlnNrqXZI= =2ydF -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ .
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-print/cups < 1.3.9-r1 >= 1.3.9-r1
Description
Several buffer overflows were found in:
-
The read_rle16 function in imagetops (CVE-2008-3639, found by regenrecht, reported via ZDI)
-
The WriteProlog function in texttops (CVE-2008-3640, found by regenrecht, reported via ZDI)
-
The Hewlett-Packard Graphics Language (HPGL) filter (CVE-2008-3641, found by regenrecht, reported via iDefense)
-
The _cupsImageReadPNG function (CVE-2008-5286, reported by iljavs)
Impact
A remote attacker could send specially crafted input to a vulnerable server, resulting in the remote execution of arbitrary code with the privileges of the user running the server.
Workaround
None this time.
Resolution
All CUPS users should upgrade to the latest version.
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-print/cups-1.3.9-r1"
References
[ 1 ] CVE-2008-3639
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3639
[ 2 ] CVE-2008-3640
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3640
[ 3 ] CVE-2008-3641
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641
[ 4 ] CVE-2008-5286
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5286
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200812-11.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. =========================================================== Ubuntu Security Notice USN-707-1 January 12, 2009 cups, cupsys vulnerabilities CVE-2008-5183, CVE-2008-5184, CVE-2008-5286, CVE-2008-5377 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 7.10 Ubuntu 8.04 LTS Ubuntu 8.10
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: cupsys 1.2.2-0ubuntu0.6.06.12
Ubuntu 7.10: cupsys 1.3.2-1ubuntu7.9
Ubuntu 8.04 LTS: cupsys 1.3.7-1ubuntu3.3
Ubuntu 8.10: cups 1.3.9-2ubuntu6.1
In general, a standard system upgrade is sufficient to effect the necessary changes.
Details follow:
It was discovered that CUPS didn't properly handle adding a large number of RSS subscriptions. A local user could exploit this and cause CUPS to crash, leading to a denial of service. This issue only applied to Ubuntu 7.10, 8.04 LTS and 8.10. (CVE-2008-5183)
It was discovered that CUPS did not authenticate users when adding and cancelling RSS subscriptions. An unprivileged local user could bypass intended restrictions and add a large number of RSS subscriptions. This issue only applied to Ubuntu 7.10 and 8.04 LTS. (CVE-2008-5184)
It was discovered that the PNG filter in CUPS did not properly handle certain malformed images. In Ubuntu 7.10, 8.04 LTS, and 8.10, attackers would be isolated by the AppArmor CUPS profile. (CVE-2008-5286)
It was discovered that the example pstopdf CUPS filter created log files in an insecure way. Local users could exploit a race condition to create or overwrite files with the privileges of the user invoking the program. This issue only applied to Ubuntu 6.06 LTS, 7.10, and 8.04 LTS. (CVE-2008-5377)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12.diff.gz
Size/MD5: 100650 effacab03a0a75663148e730badca56e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12.dsc
Size/MD5: 1060 e320589ea4731d43a927b6ea986e2ca9
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2.orig.tar.gz
Size/MD5: 4070384 2c99b8aa4c8dc25c8a84f9c06aa52e3e
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-gnutls10_1.2.2-0ubuntu0.6.06.12_all.deb
Size/MD5: 996 01d1b0dbc0bf6fed042b103b81d91293
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.12_amd64.deb
Size/MD5: 36230 ac91b545a2f40de7c165f160928334be
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.12_amd64.deb
Size/MD5: 81912 f3ec3b95abadf43c3642d422bb1d8d64
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12_amd64.deb
Size/MD5: 2286872 779f854a26f5670c1183aac0a9adf15b
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.12_amd64.deb
Size/MD5: 6092 e4f7e6b58bbcf3656487d779ada528d1
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.12_amd64.deb
Size/MD5: 77434 f7789b8cca7ea8f57ca2ca14f4cc1a9b
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.12_amd64.deb
Size/MD5: 25748 e2a92ba2421bafc00df0a6c1f99bcda8
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.12_amd64.deb
Size/MD5: 130184 6a0808bf1ea2650d8a97fc50ceee0aa6
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.12_i386.deb
Size/MD5: 34766 ec9c0af53c98f9d904a8241331179a6d
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.12_i386.deb
Size/MD5: 77990 c582e927e8d8bbdd29c5c111bc0dd162
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12_i386.deb
Size/MD5: 2254158 f9e7ba99ce5ff49546a8922df47d0005
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.12_i386.deb
Size/MD5: 6092 969b76527edef12a2f3c77a77c97480e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.12_i386.deb
Size/MD5: 76550 2e653b4dac7063a7d290918bdafd43cf
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.12_i386.deb
Size/MD5: 25748 cfff840b4e9984245fcd15d845183810
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.12_i386.deb
Size/MD5: 122384 ec7ddfb032ee70d393c65d9d90060ea0
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.12_powerpc.deb
Size/MD5: 40466 119cafd93458295da6a6c8c12b35a262
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.12_powerpc.deb
Size/MD5: 89530 bc52672d7f4903f7ec745cbe778e4da2
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12_powerpc.deb
Size/MD5: 2301402 e3bf63715dbebb29410ce13098b645f1
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.12_powerpc.deb
Size/MD5: 6088 68fd62d76fc0a4e2e515f5a644852e60
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.12_powerpc.deb
Size/MD5: 79208 b83506e935ffd0ac4c1311f003424f2b
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.12_powerpc.deb
Size/MD5: 25744 cb2ca08057f83b9b40b60960712d8766
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.12_powerpc.deb
Size/MD5: 128150 597300fc1511305508b9c0e62c061660
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.12_sparc.deb
Size/MD5: 35388 afe7217a6f8ebe6fba8f7668f8a6d5bf
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.12_sparc.deb
Size/MD5: 78722 0f5be23fb63000b5fb2945f4a40ad70a
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12_sparc.deb
Size/MD5: 2287758 3b8180329fa4c55ece2b828e07d3366c
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.12_sparc.deb
Size/MD5: 6090 aee18e619e301cdd7472d6f6a326655c
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.12_sparc.deb
Size/MD5: 76468 398ecfef9fff03f088e4964ad0e76c71
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.12_sparc.deb
Size/MD5: 25748 22655777c70067f973fef557c9196bdf
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.12_sparc.deb
Size/MD5: 123876 99879b6877338c254ae31dcd0f4bae29
Updated packages for Ubuntu 7.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9.diff.gz
Size/MD5: 129791 3e27f46f569ec5719b5fe13fb78a9f14
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9.dsc
Size/MD5: 1226 3a8eb42c55eb55163497543c39f23124
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2.orig.tar.gz
Size/MD5: 4848424 9e3e1dee4d872fdff0682041198d3d73
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.3.2-1ubuntu7.9_all.deb
Size/MD5: 1080428 2a130e02392de2ce721ac25a9a71ef0f
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.9_amd64.deb
Size/MD5: 37202 8a68cf9bfa98bda7cf30f6bfba41dd2e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.9_amd64.deb
Size/MD5: 89510 e721173ffa8c31fc92703b908140e84c
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9_amd64.deb
Size/MD5: 2034862 f512c15b34be6e169e9f947ca916ca93
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.9_amd64.deb
Size/MD5: 60018 4f4e8635956b4b882074cc2760ebcb5e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.9_amd64.deb
Size/MD5: 46878 197a3efe70b9864efe397bb27e455933
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.9_amd64.deb
Size/MD5: 152008 c05765a56717613f12ca4e47dd751864
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.9_amd64.deb
Size/MD5: 186748 03cda4eef301db2a8f2cb6f5344c9f02
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.9_i386.deb
Size/MD5: 36480 6742a1d19a47e85b583bfc6cc8e5bef1
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.9_i386.deb
Size/MD5: 86482 33d1e6cc218245db992e2b8337d63fad
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9_i386.deb
Size/MD5: 2018562 6217c3d4a08b575b0fd01a2f0b6d9965
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.9_i386.deb
Size/MD5: 58836 228f15292895fb6714cf83ac08376530
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.9_i386.deb
Size/MD5: 46256 a2a663a767af4beccac469b36af692b4
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.9_i386.deb
Size/MD5: 145696 099603137d153ed2f50e0154fde6811f
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.9_i386.deb
Size/MD5: 183548 69d7d5292ed78f5a5dca16d9be7d9ebe
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.9_lpia.deb
Size/MD5: 36670 2f95875950737fb3b29d8170e0e842be
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.9_lpia.deb
Size/MD5: 88296 51a1b00b3aa778300d6be240ca814448
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9_lpia.deb
Size/MD5: 2021580 ec2e3b013c825e7b1c269778d722c41f
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.9_lpia.deb
Size/MD5: 59622 38519a455e3dca46fdc55980903ef527
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.9_lpia.deb
Size/MD5: 47694 2a305b565e33a52d5cfe71bb09d3fbc0
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.9_lpia.deb
Size/MD5: 142418 b0423e069760ca141c0e73f07b7049fb
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.9_lpia.deb
Size/MD5: 181750 8e286ae296e7b3fd216d7137a4c21c19
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.9_powerpc.deb
Size/MD5: 46502 a1296168b5d3706b8870d2aca19cfc4a
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.9_powerpc.deb
Size/MD5: 107760 d98d3f88cf3706b28ca9706e4f21897e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9_powerpc.deb
Size/MD5: 2099848 088263da7a0baba49e4b28f000070cdf
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.9_powerpc.deb
Size/MD5: 59484 85a44c9e70aadd41bdcb9401af938361
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.9_powerpc.deb
Size/MD5: 51846 4442245f4cf71913bbd642f5185f93a0
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.9_powerpc.deb
Size/MD5: 146944 ca2f12efe3d8b1ef0711019a6f4be4a3
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.9_powerpc.deb
Size/MD5: 192530 47b0cc559fb4548701addb4e389beda1
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.9_sparc.deb
Size/MD5: 37568 441cbf24d055107a408220ea945357e6
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.9_sparc.deb
Size/MD5: 89612 42f545e2092863afc31a6beb921ba803
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9_sparc.deb
Size/MD5: 2061116 df2be5541017e5a11f265dc0420d1de4
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.9_sparc.deb
Size/MD5: 58094 4602a5ee17eae8d0769901ffff089eac
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.9_sparc.deb
Size/MD5: 45560 fce319567830955760626e98a52bd9e0
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.9_sparc.deb
Size/MD5: 148474 0fa2f0010fbd4b08d91b1c62765ed46e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.9_sparc.deb
Size/MD5: 182570 ef1eec9c88b499b3cea8742fc31d8edf
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3.diff.gz
Size/MD5: 134438 a4a1876673e461e35cfec8952ca054f5
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3.dsc
Size/MD5: 1441 2ced31d2fde396439410f30e758d7db2
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7.orig.tar.gz
Size/MD5: 4700333 383e556d9841475847da6076c88da467
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.3.7-1ubuntu3.3_all.deb
Size/MD5: 1144166 4893a05510da7c9b5434d00fc29e455f
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.3_amd64.deb
Size/MD5: 37532 480443df9d0723c844c0c0f6408169a2
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.3_amd64.deb
Size/MD5: 89978 0d287573cdcc4701998ce53af56dd3f9
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3_amd64.deb
Size/MD5: 1880612 2314ea0930f6d00794e0176916b6da35
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.3_amd64.deb
Size/MD5: 60906 9042974135c36a37171a424b7d4a202d
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.3_amd64.deb
Size/MD5: 50368 3cd1eb8125943eaa9ee6dde601f4422e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.3_amd64.deb
Size/MD5: 344934 c5aec8c571564cbd0c895145a875d02a
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.3_amd64.deb
Size/MD5: 177930 36d56cb0664534f425871d13d77e4b1a
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.3_i386.deb
Size/MD5: 36968 6f01ef27169dfc9aa944c5049acbbe63
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.3_i386.deb
Size/MD5: 88402 dd874fead670a6d57e90176ad1facc94
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3_i386.deb
Size/MD5: 1863008 ff961e2dbb46de7be8722d88178a38e6
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.3_i386.deb
Size/MD5: 60100 0881e753bb681af3463d6ed8d11c09cf
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.3_i386.deb
Size/MD5: 49846 07a541a01b7e231c9988e779a3f602d0
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.3_i386.deb
Size/MD5: 339346 d5efe383bc97ce56837e36806bfba341
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.3_i386.deb
Size/MD5: 174778 a578d4f7a0fe9195167e7a0cafc37974
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.3_lpia.deb
Size/MD5: 36678 3176e400d418ca744825919b30d1a248
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.3_lpia.deb
Size/MD5: 88752 998f5ae89f57c5a3874a2bec71f435af
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3_lpia.deb
Size/MD5: 1865256 715aafc333b7d070b516950843cdf664
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.3_lpia.deb
Size/MD5: 60548 39aa25aae6614a78a0b3c29e30d464f9
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.3_lpia.deb
Size/MD5: 50860 1ba114f3487de2725c3704efbaf6a5c5
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.3_lpia.deb
Size/MD5: 337010 98f33df59e831f8213370b533c9a6f7b
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.3_lpia.deb
Size/MD5: 173708 dca1c947f9af44e5d4c6bc2c604aa371
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.3_powerpc.deb
Size/MD5: 46930 5baf8d502a2bdca9954d98a542e92f1b
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.3_powerpc.deb
Size/MD5: 110824 b0aab96be927c4d4924df4c45049f8a0
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3_powerpc.deb
Size/MD5: 1949124 d53346f89338971030ed9a202726849c
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.3_powerpc.deb
Size/MD5: 59928 0c7f0193cfee10e401ca8304bc6a20bb
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.3_powerpc.deb
Size/MD5: 54930 694817b2babba26327d4b021a36f938a
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.3_powerpc.deb
Size/MD5: 341674 78be76c752899ff02d96f7d9f4c8cbc1
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.3_powerpc.deb
Size/MD5: 183682 2dfb517ad5388b6471fc3f33148110c7
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.3_sparc.deb
Size/MD5: 38030 018dbd428bea31bff3efe42c650ab930
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.3_sparc.deb
Size/MD5: 91034 0cdf41119c49465205ec9d85e0fcedcb
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3_sparc.deb
Size/MD5: 1897932 265d337f28fada008fdf22034c76d43b
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.3_sparc.deb
Size/MD5: 57852 5ebf07d4d87d5c0ba46bb52b0cabe6bd
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.3_sparc.deb
Size/MD5: 48224 ed14b7888ad80c70678b20881c6b9606
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.3_sparc.deb
Size/MD5: 341382 ed914dcee1d36a7437ebdb46d44fba62
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.3_sparc.deb
Size/MD5: 173608 98ee538398dcf7c112099d3e398b686e
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu6.1.diff.gz
Size/MD5: 328034 b25d444f40ebc1f17984cb538172480c
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu6.1.dsc
Size/MD5: 2043 3b36a5cadfe85ed62bf8b28de6ec7591
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9.orig.tar.gz
Size/MD5: 4809771 e6f2d90491ed050e5ff2104b617b88ea
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-common_1.3.9-2ubuntu6.1_all.deb
Size/MD5: 1162340 88ad6900549400af9f75f927227d45cb
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-bsd_1.3.9-2ubuntu6.1_all.deb
Size/MD5: 57652 7a33348b800c156e43a83e9083436bd5
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-client_1.3.9-2ubuntu6.1_all.deb
Size/MD5: 57660 6c89ff2b1f7fe264b5caaaf986b36d9c
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-dbg_1.3.9-2ubuntu6.1_all.deb
Size/MD5: 57652 ee1e3c3d68c190281678d7c1e7adadc9
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys_1.3.9-2ubuntu6.1_all.deb
Size/MD5: 57656 2e8d25c423fbc2e265b0d56633ebc67d
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsys2-dev_1.3.9-2ubuntu6.1_all.deb
Size/MD5: 57670 b0c0e0f336be70d0c458b45936f98d0d
http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys-common_1.3.9-2ubuntu6.1_all.deb
Size/MD5: 4530 23fb36af369fe018cd11fb3291dcc3cc
http://security.ubuntu.com/ubuntu/pool/universe/c/cups/libcupsys2_1.3.9-2ubuntu6.1_all.deb
Size/MD5: 57656 46de04530c997f729b7dce967559c8b3
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu6.1_amd64.deb
Size/MD5: 37318 7c4c4cadb4f9b7f6e2c6080b790e6ee1
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-2ubuntu6.1_amd64.deb
Size/MD5: 119788 72cab9079aeefee51e09a3b31ae592fa
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu6.1_amd64.deb
Size/MD5: 1682518 3180c4e3fa3d5cfe0b2b894898485fdd
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu6.1_amd64.deb
Size/MD5: 2172420 d7928f5c71b128511a0864db35ba6fe9
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu6.1_amd64.deb
Size/MD5: 352208 ba6478c9d8f3712b0c1e648e48bbb0c3
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-2ubuntu6.1_amd64.deb
Size/MD5: 172690 b2f7befc45ccf3bcd176186f9c48ceb1
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu6.1_amd64.deb
Size/MD5: 61404 a16ecd777aca26b88c24d16b69e5f193
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu6.1_amd64.deb
Size/MD5: 52392 7a9f6aabf047ad3225f8ec44d2fb5540
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu6.1_i386.deb
Size/MD5: 36216 b4999abd3bf22b2963db0969b40da8e1
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-2ubuntu6.1_i386.deb
Size/MD5: 115352 9ec804831b4557a4ada56602384ecc39
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu6.1_i386.deb
Size/MD5: 1542016 c120e8f977f4b19be21e3b3067ca0df5
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu6.1_i386.deb
Size/MD5: 2139174 18db7072b040bc4f3319b3b51361a239
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu6.1_i386.deb
Size/MD5: 345996 53a7bdb95ee0b5d3b0f96c463710dadd
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-2ubuntu6.1_i386.deb
Size/MD5: 169534 efa2f12acaf19bfab23d60478b5586cd
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu6.1_i386.deb
Size/MD5: 60536 ceb4ded5423c0a25ddcc924d29e390f5
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu6.1_i386.deb
Size/MD5: 51750 cf8f8190d6281a5881b8cc1922035758
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu6.1_lpia.deb
Size/MD5: 36030 95ca36c48f733f3d709e94c2202e97db
http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu6.1_lpia.deb
Size/MD5: 114514 c44f5a21e630c130008be55aa258cb42
http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu6.1_lpia.deb
Size/MD5: 1571226 37ce539f88c38ba11a89515ddc188d2c
http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu6.1_lpia.deb
Size/MD5: 2135890 46cb00e52f60f8adc58496bc550a5ad9
http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu6.1_lpia.deb
Size/MD5: 342976 e14329c1e782470735f35422c592b473
http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu6.1_lpia.deb
Size/MD5: 167800 9cbad1fe09d9904ae6e026987d85731a
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu6.1_lpia.deb
Size/MD5: 60672 8a5ca81cd3803ad98afe963360242177
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu6.1_lpia.deb
Size/MD5: 52440 07bf6935608f398215f2880d5be9fd25
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu6.1_powerpc.deb
Size/MD5: 43578 6876bb9233cf8352dfbf66bc95ddf7e9
http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu6.1_powerpc.deb
Size/MD5: 138186 b3868a2e0d935a95e9083773859f1cbe
http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu6.1_powerpc.deb
Size/MD5: 1663458 2bf2dae0699cf7dc45889dc678f20fcc
http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu6.1_powerpc.deb
Size/MD5: 2264178 b5b51d8116a46689275f98ea94e946af
http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu6.1_powerpc.deb
Size/MD5: 347972 af66fd54a390946c7b676cf54cb6e22e
http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu6.1_powerpc.deb
Size/MD5: 176964 0605e8b21a449afea97a3f5060af63e1
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu6.1_powerpc.deb
Size/MD5: 61336 79c4d467e37c334effe0b5ee31238901
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu6.1_powerpc.deb
Size/MD5: 57492 a6d2f97d74132b1f2a40599398ecd9b1
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu6.1_sparc.deb
Size/MD5: 37220 31f862d50b31324596054730ea09f7d3
http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu6.1_sparc.deb
Size/MD5: 117632 b594a8cb5b194fef18a0393968fe0736
http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu6.1_sparc.deb
Size/MD5: 1490260 01fcb6d2d1c062dcdfd6cde440ef2a98
http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu6.1_sparc.deb
Size/MD5: 2200956 ebfffd46f41befdda3e30e3cb1ab521e
http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu6.1_sparc.deb
Size/MD5: 344800 6192418a2f2625f81551e9839d1187b4
http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu6.1_sparc.deb
Size/MD5: 165706 5804589b4f9bcc3bf016e3394f7acb7f
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu6.1_sparc.deb
Size/MD5: 57906 34fef3b4e0a01df4a76c92768a8c292e
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu6.1_sparc.deb
Size/MD5: 49792 24e09a0af0155fd8a13ca3f1db035c6d
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200812-0322", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cups", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "1.1.19" }, { "model": "cups", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "1.1.20" }, { "model": "cups", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "1.3" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.5" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.3.5" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.3.1" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.22" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.21" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.7" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.6" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.2" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.3.3" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.3.8" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.3.6" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.10" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.3.2" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.3.7" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.3.0" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.12" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.18" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.0" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.8" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.23" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.3.9" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.3.4" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.9" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.1" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.11" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.4" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.17" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.3" }, { "model": "cups", "scope": "eq", "trust": 0.8, "vendor": "cups", "version": "1.1.17 to 1.3.9" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0 (x86-64)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "linux enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise desktop sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10.3" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "appliance platform linux service", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "2" }, { "model": "appliance platform linux service", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20080" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.3.9" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.3.8" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.3.7" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.3.6" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.3.5" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.3.3" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.3.2" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.2.12" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.2.10" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.2.9" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.2.8" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.2.4" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.2.2" }, { "model": "software products cups rc1", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.23" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.23" }, { "model": "software products cups rc1", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.22" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.22" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.21" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.20" }, { "model": "software products cups rc5", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.19" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.19" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.18" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.17" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "software products cups", "scope": "ne", "trust": 0.3, "vendor": "easy", "version": "1.3.10" } ], "sources": [ { "db": "BID", "id": "32518" }, { "db": "JVNDB", "id": "JVNDB-2008-002227" }, { "db": "CNNVD", "id": "CNNVD-200812-003" }, { "db": "NVD", "id": "CVE-2008-5286" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2008-5286" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "iljavs", "sources": [ { "db": "CNNVD", "id": "CNNVD-200812-003" } ], "trust": 0.6 }, "cve": "CVE-2008-5286", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2008-5286", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-35411", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2008-5286", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200812-003", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-35411", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-35411" }, { "db": "JVNDB", "id": "JVNDB-2008-002227" }, { "db": "CNNVD", "id": "CNNVD-200812-003" }, { "db": "NVD", "id": "CVE-2008-5286" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow. Common Unix Printing System(CUPS)\u662f\u4e00\u6b3e\u901a\u7528Unix\u6253\u5370\u7cfb\u7edf\uff0c\u662fUnix\u73af\u5883\u4e0b\u7684\u8de8\u5e73\u53f0\u6253\u5370\u89e3\u51b3\u65b9\u6848\uff0c\u57fa\u4e8eInternet\u6253\u5370\u534f\u8bae\uff0c\u63d0\u4f9b\u5927\u591a\u6570PostScript\u548craster\u6253\u5370\u673a\u670d\u52a1. \nCUPS PNG\u8fc7\u6ee4\u5668\u7684_cupsImageReadPNG()\u51fd\u6570\u4e2d\u6267\u884c\u4e86\u4ee5\u4e0b\u8ba1\u7b97\uff1a\nbufsize = img-\uff1exsize * img-\uff1eysize * 3;\nif ((bufsize / (img-\uff1eysize * 3)) != img-\uff1exsize)\n{\nfprintf(stderr, \\\"DEBUG\uff1a PNG image dimensions (\\\\%ux\\\\%u) too large!\uff3cn\\\",\n(unsigned)width, (unsigned)height);\nfclose(fp);\nreturn (1);\n}\n\u9a8c\u8bc1\u4ee3\u7801\u7684img-\uff1eysize * 3\u53ef\u80fd\u4f1a\u51fa\u73b0\u6574\u6570\u6ea2\u51fa\uff0c\u5bfc\u81f4\u6267\u884c\u4efb\u610f\u4ee3\u7801. CUPS is prone to an integer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied PNG image sizes before using them to allocate memory buffers. \nSuccessful exploits may allow attackers to execute arbitrary code with the privileges of a user running the utilities. Failed exploit attempts likely cause denial-of-service conditions. \nVersions prior to CUPS 1.3.10 are vulnerable. It is based on the Internet Printing Protocol and provides most PostScript and raster printer services. \n\nFor the stable distribution (etch) this problem has been fixed in\nversion 1.2.7-4etch6. \n\nFor testing distribution (lenny) this issue will be fixed soon. \n\nFor the unstable distribution (sid) this problem has been fixed in\nversion 1.3.8-1lenny4. \n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6.dsc\n Size/MD5 checksum: 1092 a7198b7e0d7724a972d4027e805b1387\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6.diff.gz\n Size/MD5 checksum: 108940 1321ea49cfa8c06d619759acb00b0b2e\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7.orig.tar.gz\n Size/MD5 checksum: 4214272 c9ba33356e5bb93efbcf77b6e142e498\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-common_1.2.7-4etch6_all.deb\n Size/MD5 checksum: 917900 4abe699f9d2a8f866b1e323934c6172a\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.2.7-4etch6_all.deb\n Size/MD5 checksum: 46256 9e98540d35e8a7aef76a1042cc4befe4\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_alpha.deb\n Size/MD5 checksum: 1614646 18542415a7a35563aacf6baccc2c474c\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_alpha.deb\n Size/MD5 checksum: 39316 641f1871ea3d1e61a56dc009b2e58652\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_alpha.deb\n Size/MD5 checksum: 85894 99a322067e2207a67afc55dccd5d63b4\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_alpha.deb\n Size/MD5 checksum: 1092462 e2c0dd66dc9d52d41b7e179fa83908ab\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_alpha.deb\n Size/MD5 checksum: 95658 51c76b87321a3c01dfe996fabad2de88\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_alpha.deb\n Size/MD5 checksum: 72682 751a0c814ae40bf75b0494dafd19bd8e\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_alpha.deb\n Size/MD5 checksum: 175346 f8701aeb6bc3670c3f1e60cc80c4ded7\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_alpha.deb\n Size/MD5 checksum: 183712 42dc520b09c22f1d25b7ff1e6d7574bb\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_amd64.deb\n Size/MD5 checksum: 1576182 fe94635e099af684c654fb6468522f21\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_amd64.deb\n Size/MD5 checksum: 36342 3e5954fdc1c572e86f2eeef93c1f466f\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_amd64.deb\n Size/MD5 checksum: 80704 9a21d4104655094da5f2ff3a4c019a08\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_amd64.deb\n Size/MD5 checksum: 1087506 cd83b8b030a4c972b1b3fa396114d9e9\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_amd64.deb\n Size/MD5 checksum: 86360 aeed41809da68dc26e7c586e87878c45\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_amd64.deb\n Size/MD5 checksum: 53008 9f8e3453367ef72e6ef6f00dc6baf624\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_amd64.deb\n Size/MD5 checksum: 162608 a768dc52659411be6fd46b38df61d69b\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_amd64.deb\n Size/MD5 checksum: 142546 a6caf31df81c4aea72c0abc9c0a0b1af\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_arm.deb\n Size/MD5 checksum: 1569702 f7cd63fd8d10e8fcaea2649260b8437a\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_arm.deb\n Size/MD5 checksum: 35934 e5a3e25422b8ded68767d8c32d9291f5\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_arm.deb\n Size/MD5 checksum: 78916 f9707c6c35f2c3198892a8d82eecfa8b\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_arm.deb\n Size/MD5 checksum: 1026248 79e9a9669d9d896d303e29ed7d2b7122\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_arm.deb\n Size/MD5 checksum: 85540 45e25e1887e37f029a3a8da50b309fe4\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_arm.deb\n Size/MD5 checksum: 48732 b90d30685f1e68a036a512cf331547e6\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_arm.deb\n Size/MD5 checksum: 155278 1a0b8b93532c23d26866afc163689dd6\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_arm.deb\n Size/MD5 checksum: 132032 5c4843fe297598ee3c618f92feaef93e\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_hppa.deb\n Size/MD5 checksum: 1624116 e285d90e7861906f00f8e709cb3039ae\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_hppa.deb\n Size/MD5 checksum: 39544 d3015a7ef0c7c345d3940a6c9f428cf0\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_hppa.deb\n Size/MD5 checksum: 84804 a4fa9da96d848e7596d6e3d623fdef07\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_hppa.deb\n Size/MD5 checksum: 1032854 ec6badd9fcff41974f425d97a0a12165\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_hppa.deb\n Size/MD5 checksum: 92038 3dcbb10b949495e21fc742b9b42a3a84\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_hppa.deb\n Size/MD5 checksum: 57376 e64d3d7a95c80c92602e3e7548998bc2\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_hppa.deb\n Size/MD5 checksum: 171856 ab864167ddd2c8b4247898ed36059435\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_hppa.deb\n Size/MD5 checksum: 153942 4149487b7dfd72b027de9851a4adb32e\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_i386.deb\n Size/MD5 checksum: 1556170 c0cefa71d7f58abd666c2c1459d3ede9\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_i386.deb\n Size/MD5 checksum: 36250 e464d81d46968426796a8182e6418691\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_i386.deb\n Size/MD5 checksum: 79702 77c4aef7c78be537c09bc689ad1f5139\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_i386.deb\n Size/MD5 checksum: 997624 ec73926b9d49c2790c6381a927ad20a2\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_i386.deb\n Size/MD5 checksum: 87310 86517be38ba93afd954091ad5643c65b\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_i386.deb\n Size/MD5 checksum: 53240 4fccf1dfd78b230033407a914760d3f5\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_i386.deb\n Size/MD5 checksum: 161274 41344ee4c268c095b89c8decc0e2df68\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_i386.deb\n Size/MD5 checksum: 137796 51b8758e0338e1ec6ec9d74ea5f960ef\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_ia64.deb\n Size/MD5 checksum: 1771030 d4235a8ee49af176f27c8a097a696864\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_ia64.deb\n Size/MD5 checksum: 46326 729ebfb9347d0463f7a6f5cc10c371e7\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_ia64.deb\n Size/MD5 checksum: 106218 9a9142746bbca2c53644c084b45fea9c\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_ia64.deb\n Size/MD5 checksum: 1108324 ea4f9d4d44e6b964c3793fd3a2862671\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_ia64.deb\n Size/MD5 checksum: 107068 bab641470a0bf7034b9ebc7ae072d6fa\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_ia64.deb\n Size/MD5 checksum: 74214 770441377ccf9ad422da6e9d3ba612eb\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_ia64.deb\n Size/MD5 checksum: 204316 7df30a0f5661ea79cdcc537d4012b217\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_ia64.deb\n Size/MD5 checksum: 192364 41d3bab218b036299f8ffae98a9008de\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_mips.deb\n Size/MD5 checksum: 1567974 ba75b6ff260e84dd64b939cae9262a54\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_mips.deb\n Size/MD5 checksum: 36112 6cae983101bdd812ff1f6f26169ab06a\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_mips.deb\n Size/MD5 checksum: 76146 16b61a899c465fc7f142d97744dffba3\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_mips.deb\n Size/MD5 checksum: 1098272 daa46352b0ad47b5c3061c42a15e6ddb\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_mips.deb\n Size/MD5 checksum: 86920 dd75cd6ce9bd9ceaae7d39b60fda49c9\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_mips.deb\n Size/MD5 checksum: 57690 32cfeb2301ded386cf4ab6d0127f30a3\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_mips.deb\n Size/MD5 checksum: 158092 9abd9b0ce1dc1528b0ca50b5fbb7b78b\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_mips.deb\n Size/MD5 checksum: 150986 149531690113d5333beaf1622f915037\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_mipsel.deb\n Size/MD5 checksum: 1553596 a42820cf5bd8d46c4a5cab2a6bd0929a\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_mipsel.deb\n Size/MD5 checksum: 36076 f7239a53b24df0813b16aac1efc850b7\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_mipsel.deb\n Size/MD5 checksum: 77462 a60a8f2d6ab7958026585952890fc751\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_mipsel.deb\n Size/MD5 checksum: 1085502 a18f21c9c0eff69d326bf42596d3ed32\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_mipsel.deb\n Size/MD5 checksum: 87080 1b5618e9841ec899e63ee14cb36116d1\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_mipsel.deb\n Size/MD5 checksum: 57848 def6826bc2876abfcf1b9ad01eea3546\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_mipsel.deb\n Size/MD5 checksum: 158634 bc4151665423bb6acc3225d1f8017b50\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_mipsel.deb\n Size/MD5 checksum: 150888 f27527d8e7d3b892f5e2dc7aa0776434\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_powerpc.deb\n Size/MD5 checksum: 1576684 9c91771aea9ad144c56967ac8caf1fd5\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_powerpc.deb\n Size/MD5 checksum: 41290 69d7ba1506a7415dc74621aa833edf59\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_powerpc.deb\n Size/MD5 checksum: 89994 12245002a3f5e437921979cd8362d346\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_powerpc.deb\n Size/MD5 checksum: 1143404 c79dd5b219961ded9d9dfebf2361fed0\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_powerpc.deb\n Size/MD5 checksum: 88542 988f4b258fbdf870d51aacd1dd26b116\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_powerpc.deb\n Size/MD5 checksum: 51880 650b5a80af7485308b6fca8a0453c9c0\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_powerpc.deb\n Size/MD5 checksum: 163284 4fc43ad526d97ad3823524988c892851\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_powerpc.deb\n Size/MD5 checksum: 136868 2e1cdfaf184170342520895e26ee84b1\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_s390.deb\n Size/MD5 checksum: 1587456 5522fd1afaaa1105a51c91354783fd6f\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_s390.deb\n Size/MD5 checksum: 37422 38b8fd3823381f4384f8758139f3d418\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_s390.deb\n Size/MD5 checksum: 82336 55c8f39b3d04e0a127426f2daf89941f\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_s390.deb\n Size/MD5 checksum: 1037274 02149d41988647e7f4de8e626801c588\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_s390.deb\n Size/MD5 checksum: 88040 8c844af7aeb9c0e1ec9a093a537d5f91\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_s390.deb\n Size/MD5 checksum: 52508 c3695c0157c8bba7eb2bc614173bcd0f\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_s390.deb\n Size/MD5 checksum: 166802 1893c39f92d371c7b474d57f4d8c105e\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_s390.deb\n Size/MD5 checksum: 144928 0eb6cdbc1deceb32bbf2c145a99f7d98\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_sparc.deb\n Size/MD5 checksum: 1562538 0757006ce0c52845673d2cbe9fae0b38\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_sparc.deb\n Size/MD5 checksum: 36020 27636d7df41cfef4c9e41ee236a9b308\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_sparc.deb\n Size/MD5 checksum: 78518 174e3b09d2d667e01d0b47ecb06a2925\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_sparc.deb\n Size/MD5 checksum: 992164 79a9729f9280b70aa7e8573636cfeb8c\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_sparc.deb\n Size/MD5 checksum: 85368 4c3b851a551b47fed4229f55b8a0a4fe\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_sparc.deb\n Size/MD5 checksum: 51756 d4406a58edf127974a79b0df75eab757\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_sparc.deb\n Size/MD5 checksum: 159176 29057219279ea090cf47b35b1da416af\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_sparc.deb\n Size/MD5 checksum: 139560 ca580a13d486d24f74c9a230efee6bde\n\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFJNaPhW5ql+IAeqTIRAiX7AJwJd3Szo5tvpYyBrqggsDuPSulvKACfVJsa\nEwALyW+6s+Lgp2d1GI2ong4=\n=R0SH\n-----END PGP SIGNATURE-----\n. \n\n----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nDownload and test it today:\nhttps://psi.secunia.com/\n\nRead more about this new version:\nhttps://psi.secunia.com/?page=changelog\n\n----------------------------------------------------------------------\n\nTITLE:\nCUPS \"process_browse_data()\" Double Free Vulnerability\n\nSECUNIA ADVISORY ID:\nSA28994\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/28994/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nCUPS 1.x\nhttp://secunia.com/product/921/\n\nDESCRIPTION:\nA vulnerability has been discovered in CUPS, which can be exploited\nby malicious people to cause a DoS (Denial of Service) or to\npotentially compromise a vulnerable system. \n\nThe vulnerability is caused due to an error within the\n\"process_browse_data()\" function when adding printers and classes. \nThis can be exploited to free the same buffer twice by sending\nspecially crafted browser packets to the UDP port on which cupsd is\nlistening (by default port 631/UDP). \n\nThe vulnerability is confirmed in version 1.3.5. \n\nSOLUTION:\nUpdate to version 1.3.6. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported as a CUPS bug by h.blischke. \n\nORIGINAL ADVISORY:\nhttp://www.cups.org/str.php?L2656\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n\n Mandriva Linux Security Advisory MDVSA-2009:028\n http://www.mandriva.com/security/\n _______________________________________________________________________\n\n Package : cups\n Date : January 24, 2009\n Affected: 2008.0, 2008.1\n _______________________________________________________________________\n\n Problem Description:\n\n Security vulnerabilities have been discovered and corrected in CUPS. \n \n CUPS before 1.3.8 allows local users, and possibly remote attackers,\n to cause a denial of service (daemon crash) by adding a large number\n of RSS Subscriptions, which triggers a NULL pointer dereference\n (CVE-2008-5183). \n \n The web interface (cgi-bin/admin.c) in CUPS before 1.3.8 uses the\n guest username when a user is not logged on to the web server, which\n makes it easier for remote attackers to bypass intended policy and\n conduct CSRF attacks via the (1) add and (2) cancel RSS subscription\n functions (CVE-2008-5184). \n \n The updated packages have been patched to prevent this. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5183\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5184\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5286\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0032\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2008.0:\n 9ff1555139c59b89ea0623dfdfff4de5 2008.0/i586/cups-1.3.6-1.4mdv2008.0.i586.rpm\n 3cda60090d2108259f55cdbc6cf372e5 2008.0/i586/cups-common-1.3.6-1.4mdv2008.0.i586.rpm\n 1fbbbf89a0341cf430905757bdc6c355 2008.0/i586/cups-serial-1.3.6-1.4mdv2008.0.i586.rpm\n f6eb5a73b984f77e851cb39826ba26a1 2008.0/i586/libcups2-1.3.6-1.4mdv2008.0.i586.rpm\n e8279e8427ef9c3ec9536abe94038423 2008.0/i586/libcups2-devel-1.3.6-1.4mdv2008.0.i586.rpm\n 9974e6ad715a853706ec26acf9ca73c3 2008.0/i586/php-cups-1.3.6-1.4mdv2008.0.i586.rpm \n 6f6a298d7935094b6fcd18d39c3de1b7 2008.0/SRPMS/cups-1.3.6-1.4mdv2008.0.src.rpm\n\n Mandriva Linux 2008.0/X86_64:\n 355ce3cfb79a4aebbdabedb206a32e05 2008.0/x86_64/cups-1.3.6-1.4mdv2008.0.x86_64.rpm\n e3a2b95ac7138318d6cefab0fdf3face 2008.0/x86_64/cups-common-1.3.6-1.4mdv2008.0.x86_64.rpm\n fb0abf9e3d492edd06876b7d4cebe784 2008.0/x86_64/cups-serial-1.3.6-1.4mdv2008.0.x86_64.rpm\n 5b5196b27e24fb6ad910563ed884ce2e 2008.0/x86_64/lib64cups2-1.3.6-1.4mdv2008.0.x86_64.rpm\n e8b1cdbba7283ff2e9b76eb498f508d0 2008.0/x86_64/lib64cups2-devel-1.3.6-1.4mdv2008.0.x86_64.rpm\n 178ca59986af801a2c29611fa16ce2dd 2008.0/x86_64/php-cups-1.3.6-1.4mdv2008.0.x86_64.rpm \n 6f6a298d7935094b6fcd18d39c3de1b7 2008.0/SRPMS/cups-1.3.6-1.4mdv2008.0.src.rpm\n\n Mandriva Linux 2008.1:\n 93a94c922f72f8844e232ed779a8c66c 2008.1/i586/cups-1.3.6-5.3mdv2008.1.i586.rpm\n eccb6a07dd53dbbeb490675c2cf311f0 2008.1/i586/cups-common-1.3.6-5.3mdv2008.1.i586.rpm\n 2ad9c7135f6d8a2217d34055ca8f57b3 2008.1/i586/cups-serial-1.3.6-5.3mdv2008.1.i586.rpm\n 62d4efcf07165da647db08d6636ac596 2008.1/i586/libcups2-1.3.6-5.3mdv2008.1.i586.rpm\n f0779950606ab9fa83b9de410a7beb70 2008.1/i586/libcups2-devel-1.3.6-5.3mdv2008.1.i586.rpm\n d0bd96dc1aec2dab736d538a7bd49a2b 2008.1/i586/php-cups-1.3.6-5.3mdv2008.1.i586.rpm \n abd1474014a74c467881ca52b4090ace 2008.1/SRPMS/cups-1.3.6-5.3mdv2008.1.src.rpm\n\n Mandriva Linux 2008.1/X86_64:\n 64aca60db93cd3886f58823155e2f982 2008.1/x86_64/cups-1.3.6-5.3mdv2008.1.x86_64.rpm\n 2cb2d9467430c4619ed23d37099ad2cc 2008.1/x86_64/cups-common-1.3.6-5.3mdv2008.1.x86_64.rpm\n 69b5f842144013c41c946783c898c1db 2008.1/x86_64/cups-serial-1.3.6-5.3mdv2008.1.x86_64.rpm\n 243a0d7da4c4e24ac8c7571a202e1627 2008.1/x86_64/lib64cups2-1.3.6-5.3mdv2008.1.x86_64.rpm\n 2d4bbbd60d026d3bc272001d447dc5ae 2008.1/x86_64/lib64cups2-devel-1.3.6-5.3mdv2008.1.x86_64.rpm\n e1a2d953fdc0dbb7eda2097f0e4c38e9 2008.1/x86_64/php-cups-1.3.6-5.3mdv2008.1.x86_64.rpm \n abd1474014a74c467881ca52b4090ace 2008.1/SRPMS/cups-1.3.6-5.3mdv2008.1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFJe0RhmqjQ0CJFipgRAsXFAKDBJeogydK5chEfSmEpHuVXDsC6xQCgq+vl\nJbRgydRjIpXNqGzlnNrqXZI=\n=2ydF\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-print/cups \u003c 1.3.9-r1 \u003e= 1.3.9-r1\n\nDescription\n===========\n\nSeveral buffer overflows were found in:\n\n* The read_rle16 function in imagetops (CVE-2008-3639, found by\n regenrecht, reported via ZDI)\n\n* The WriteProlog function in texttops (CVE-2008-3640, found by\n regenrecht, reported via ZDI)\n\n* The Hewlett-Packard Graphics Language (HPGL) filter (CVE-2008-3641,\n found by regenrecht, reported via iDefense)\n\n* The _cupsImageReadPNG function (CVE-2008-5286, reported by iljavs)\n\nImpact\n======\n\nA remote attacker could send specially crafted input to a vulnerable\nserver, resulting in the remote execution of arbitrary code with the\nprivileges of the user running the server. \n\nWorkaround\n==========\n\nNone this time. \n\nResolution\n==========\n\nAll CUPS users should upgrade to the latest version. \n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-print/cups-1.3.9-r1\"\n\nReferences\n==========\n\n [ 1 ] CVE-2008-3639\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3639\n [ 2 ] CVE-2008-3640\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3640\n [ 3 ] CVE-2008-3641\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641\n [ 4 ] CVE-2008-5286\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5286\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200812-11.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2008 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. ===========================================================\nUbuntu Security Notice USN-707-1 January 12, 2009\ncups, cupsys vulnerabilities\nCVE-2008-5183, CVE-2008-5184, CVE-2008-5286, CVE-2008-5377\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 7.10\nUbuntu 8.04 LTS\nUbuntu 8.10\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n cupsys 1.2.2-0ubuntu0.6.06.12\n\nUbuntu 7.10:\n cupsys 1.3.2-1ubuntu7.9\n\nUbuntu 8.04 LTS:\n cupsys 1.3.7-1ubuntu3.3\n\nUbuntu 8.10:\n cups 1.3.9-2ubuntu6.1\n\nIn general, a standard system upgrade is sufficient to effect the\nnecessary changes. \n\nDetails follow:\n\nIt was discovered that CUPS didn\u0027t properly handle adding a large number of RSS\nsubscriptions. A local user could exploit this and cause CUPS to crash, leading\nto a denial of service. This issue only applied to Ubuntu 7.10, 8.04 LTS and\n8.10. (CVE-2008-5183)\n\nIt was discovered that CUPS did not authenticate users when adding and\ncancelling RSS subscriptions. An unprivileged local user could bypass intended\nrestrictions and add a large number of RSS subscriptions. This issue only\napplied to Ubuntu 7.10 and 8.04 LTS. (CVE-2008-5184)\n\nIt was discovered that the PNG filter in CUPS did not properly handle certain\nmalformed images. In Ubuntu 7.10, 8.04 LTS, and 8.10,\nattackers would be isolated by the AppArmor CUPS profile. (CVE-2008-5286)\n\nIt was discovered that the example pstopdf CUPS filter created log files in an\ninsecure way. Local users could exploit a race condition to create or overwrite\nfiles with the privileges of the user invoking the program. This issue only\napplied to Ubuntu 6.06 LTS, 7.10, and 8.04 LTS. (CVE-2008-5377)\n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12.diff.gz\n Size/MD5: 100650 effacab03a0a75663148e730badca56e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12.dsc\n Size/MD5: 1060 e320589ea4731d43a927b6ea986e2ca9\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2.orig.tar.gz\n Size/MD5: 4070384 2c99b8aa4c8dc25c8a84f9c06aa52e3e\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-gnutls10_1.2.2-0ubuntu0.6.06.12_all.deb\n Size/MD5: 996 01d1b0dbc0bf6fed042b103b81d91293\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.12_amd64.deb\n Size/MD5: 36230 ac91b545a2f40de7c165f160928334be\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.12_amd64.deb\n Size/MD5: 81912 f3ec3b95abadf43c3642d422bb1d8d64\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12_amd64.deb\n Size/MD5: 2286872 779f854a26f5670c1183aac0a9adf15b\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.12_amd64.deb\n Size/MD5: 6092 e4f7e6b58bbcf3656487d779ada528d1\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.12_amd64.deb\n Size/MD5: 77434 f7789b8cca7ea8f57ca2ca14f4cc1a9b\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.12_amd64.deb\n Size/MD5: 25748 e2a92ba2421bafc00df0a6c1f99bcda8\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.12_amd64.deb\n Size/MD5: 130184 6a0808bf1ea2650d8a97fc50ceee0aa6\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.12_i386.deb\n Size/MD5: 34766 ec9c0af53c98f9d904a8241331179a6d\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.12_i386.deb\n Size/MD5: 77990 c582e927e8d8bbdd29c5c111bc0dd162\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12_i386.deb\n Size/MD5: 2254158 f9e7ba99ce5ff49546a8922df47d0005\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.12_i386.deb\n Size/MD5: 6092 969b76527edef12a2f3c77a77c97480e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.12_i386.deb\n Size/MD5: 76550 2e653b4dac7063a7d290918bdafd43cf\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.12_i386.deb\n Size/MD5: 25748 cfff840b4e9984245fcd15d845183810\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.12_i386.deb\n Size/MD5: 122384 ec7ddfb032ee70d393c65d9d90060ea0\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.12_powerpc.deb\n Size/MD5: 40466 119cafd93458295da6a6c8c12b35a262\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.12_powerpc.deb\n Size/MD5: 89530 bc52672d7f4903f7ec745cbe778e4da2\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12_powerpc.deb\n Size/MD5: 2301402 e3bf63715dbebb29410ce13098b645f1\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.12_powerpc.deb\n Size/MD5: 6088 68fd62d76fc0a4e2e515f5a644852e60\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.12_powerpc.deb\n Size/MD5: 79208 b83506e935ffd0ac4c1311f003424f2b\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.12_powerpc.deb\n Size/MD5: 25744 cb2ca08057f83b9b40b60960712d8766\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.12_powerpc.deb\n Size/MD5: 128150 597300fc1511305508b9c0e62c061660\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.12_sparc.deb\n Size/MD5: 35388 afe7217a6f8ebe6fba8f7668f8a6d5bf\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.12_sparc.deb\n Size/MD5: 78722 0f5be23fb63000b5fb2945f4a40ad70a\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12_sparc.deb\n Size/MD5: 2287758 3b8180329fa4c55ece2b828e07d3366c\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.12_sparc.deb\n Size/MD5: 6090 aee18e619e301cdd7472d6f6a326655c\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.12_sparc.deb\n Size/MD5: 76468 398ecfef9fff03f088e4964ad0e76c71\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.12_sparc.deb\n Size/MD5: 25748 22655777c70067f973fef557c9196bdf\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.12_sparc.deb\n Size/MD5: 123876 99879b6877338c254ae31dcd0f4bae29\n\nUpdated packages for Ubuntu 7.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9.diff.gz\n Size/MD5: 129791 3e27f46f569ec5719b5fe13fb78a9f14\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9.dsc\n Size/MD5: 1226 3a8eb42c55eb55163497543c39f23124\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2.orig.tar.gz\n Size/MD5: 4848424 9e3e1dee4d872fdff0682041198d3d73\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.3.2-1ubuntu7.9_all.deb\n Size/MD5: 1080428 2a130e02392de2ce721ac25a9a71ef0f\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.9_amd64.deb\n Size/MD5: 37202 8a68cf9bfa98bda7cf30f6bfba41dd2e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.9_amd64.deb\n Size/MD5: 89510 e721173ffa8c31fc92703b908140e84c\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9_amd64.deb\n Size/MD5: 2034862 f512c15b34be6e169e9f947ca916ca93\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.9_amd64.deb\n Size/MD5: 60018 4f4e8635956b4b882074cc2760ebcb5e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.9_amd64.deb\n Size/MD5: 46878 197a3efe70b9864efe397bb27e455933\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.9_amd64.deb\n Size/MD5: 152008 c05765a56717613f12ca4e47dd751864\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.9_amd64.deb\n Size/MD5: 186748 03cda4eef301db2a8f2cb6f5344c9f02\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.9_i386.deb\n Size/MD5: 36480 6742a1d19a47e85b583bfc6cc8e5bef1\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.9_i386.deb\n Size/MD5: 86482 33d1e6cc218245db992e2b8337d63fad\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9_i386.deb\n Size/MD5: 2018562 6217c3d4a08b575b0fd01a2f0b6d9965\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.9_i386.deb\n Size/MD5: 58836 228f15292895fb6714cf83ac08376530\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.9_i386.deb\n Size/MD5: 46256 a2a663a767af4beccac469b36af692b4\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.9_i386.deb\n Size/MD5: 145696 099603137d153ed2f50e0154fde6811f\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.9_i386.deb\n Size/MD5: 183548 69d7d5292ed78f5a5dca16d9be7d9ebe\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.9_lpia.deb\n Size/MD5: 36670 2f95875950737fb3b29d8170e0e842be\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.9_lpia.deb\n Size/MD5: 88296 51a1b00b3aa778300d6be240ca814448\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9_lpia.deb\n Size/MD5: 2021580 ec2e3b013c825e7b1c269778d722c41f\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.9_lpia.deb\n Size/MD5: 59622 38519a455e3dca46fdc55980903ef527\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.9_lpia.deb\n Size/MD5: 47694 2a305b565e33a52d5cfe71bb09d3fbc0\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.9_lpia.deb\n Size/MD5: 142418 b0423e069760ca141c0e73f07b7049fb\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.9_lpia.deb\n Size/MD5: 181750 8e286ae296e7b3fd216d7137a4c21c19\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.9_powerpc.deb\n Size/MD5: 46502 a1296168b5d3706b8870d2aca19cfc4a\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.9_powerpc.deb\n Size/MD5: 107760 d98d3f88cf3706b28ca9706e4f21897e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9_powerpc.deb\n Size/MD5: 2099848 088263da7a0baba49e4b28f000070cdf\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.9_powerpc.deb\n Size/MD5: 59484 85a44c9e70aadd41bdcb9401af938361\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.9_powerpc.deb\n Size/MD5: 51846 4442245f4cf71913bbd642f5185f93a0\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.9_powerpc.deb\n Size/MD5: 146944 ca2f12efe3d8b1ef0711019a6f4be4a3\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.9_powerpc.deb\n Size/MD5: 192530 47b0cc559fb4548701addb4e389beda1\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.9_sparc.deb\n Size/MD5: 37568 441cbf24d055107a408220ea945357e6\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.9_sparc.deb\n Size/MD5: 89612 42f545e2092863afc31a6beb921ba803\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9_sparc.deb\n Size/MD5: 2061116 df2be5541017e5a11f265dc0420d1de4\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.9_sparc.deb\n Size/MD5: 58094 4602a5ee17eae8d0769901ffff089eac\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.9_sparc.deb\n Size/MD5: 45560 fce319567830955760626e98a52bd9e0\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.9_sparc.deb\n Size/MD5: 148474 0fa2f0010fbd4b08d91b1c62765ed46e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.9_sparc.deb\n Size/MD5: 182570 ef1eec9c88b499b3cea8742fc31d8edf\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3.diff.gz\n Size/MD5: 134438 a4a1876673e461e35cfec8952ca054f5\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3.dsc\n Size/MD5: 1441 2ced31d2fde396439410f30e758d7db2\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7.orig.tar.gz\n Size/MD5: 4700333 383e556d9841475847da6076c88da467\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.3.7-1ubuntu3.3_all.deb\n Size/MD5: 1144166 4893a05510da7c9b5434d00fc29e455f\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.3_amd64.deb\n Size/MD5: 37532 480443df9d0723c844c0c0f6408169a2\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.3_amd64.deb\n Size/MD5: 89978 0d287573cdcc4701998ce53af56dd3f9\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3_amd64.deb\n Size/MD5: 1880612 2314ea0930f6d00794e0176916b6da35\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.3_amd64.deb\n Size/MD5: 60906 9042974135c36a37171a424b7d4a202d\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.3_amd64.deb\n Size/MD5: 50368 3cd1eb8125943eaa9ee6dde601f4422e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.3_amd64.deb\n Size/MD5: 344934 c5aec8c571564cbd0c895145a875d02a\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.3_amd64.deb\n Size/MD5: 177930 36d56cb0664534f425871d13d77e4b1a\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.3_i386.deb\n Size/MD5: 36968 6f01ef27169dfc9aa944c5049acbbe63\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.3_i386.deb\n Size/MD5: 88402 dd874fead670a6d57e90176ad1facc94\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3_i386.deb\n Size/MD5: 1863008 ff961e2dbb46de7be8722d88178a38e6\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.3_i386.deb\n Size/MD5: 60100 0881e753bb681af3463d6ed8d11c09cf\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.3_i386.deb\n Size/MD5: 49846 07a541a01b7e231c9988e779a3f602d0\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.3_i386.deb\n Size/MD5: 339346 d5efe383bc97ce56837e36806bfba341\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.3_i386.deb\n Size/MD5: 174778 a578d4f7a0fe9195167e7a0cafc37974\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.3_lpia.deb\n Size/MD5: 36678 3176e400d418ca744825919b30d1a248\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.3_lpia.deb\n Size/MD5: 88752 998f5ae89f57c5a3874a2bec71f435af\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3_lpia.deb\n Size/MD5: 1865256 715aafc333b7d070b516950843cdf664\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.3_lpia.deb\n Size/MD5: 60548 39aa25aae6614a78a0b3c29e30d464f9\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.3_lpia.deb\n Size/MD5: 50860 1ba114f3487de2725c3704efbaf6a5c5\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.3_lpia.deb\n Size/MD5: 337010 98f33df59e831f8213370b533c9a6f7b\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.3_lpia.deb\n Size/MD5: 173708 dca1c947f9af44e5d4c6bc2c604aa371\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.3_powerpc.deb\n Size/MD5: 46930 5baf8d502a2bdca9954d98a542e92f1b\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.3_powerpc.deb\n Size/MD5: 110824 b0aab96be927c4d4924df4c45049f8a0\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3_powerpc.deb\n Size/MD5: 1949124 d53346f89338971030ed9a202726849c\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.3_powerpc.deb\n Size/MD5: 59928 0c7f0193cfee10e401ca8304bc6a20bb\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.3_powerpc.deb\n Size/MD5: 54930 694817b2babba26327d4b021a36f938a\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.3_powerpc.deb\n Size/MD5: 341674 78be76c752899ff02d96f7d9f4c8cbc1\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.3_powerpc.deb\n Size/MD5: 183682 2dfb517ad5388b6471fc3f33148110c7\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.3_sparc.deb\n Size/MD5: 38030 018dbd428bea31bff3efe42c650ab930\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.3_sparc.deb\n Size/MD5: 91034 0cdf41119c49465205ec9d85e0fcedcb\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3_sparc.deb\n Size/MD5: 1897932 265d337f28fada008fdf22034c76d43b\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.3_sparc.deb\n Size/MD5: 57852 5ebf07d4d87d5c0ba46bb52b0cabe6bd\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.3_sparc.deb\n Size/MD5: 48224 ed14b7888ad80c70678b20881c6b9606\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.3_sparc.deb\n Size/MD5: 341382 ed914dcee1d36a7437ebdb46d44fba62\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.3_sparc.deb\n Size/MD5: 173608 98ee538398dcf7c112099d3e398b686e\n\nUpdated packages for Ubuntu 8.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu6.1.diff.gz\n Size/MD5: 328034 b25d444f40ebc1f17984cb538172480c\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu6.1.dsc\n Size/MD5: 2043 3b36a5cadfe85ed62bf8b28de6ec7591\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9.orig.tar.gz\n Size/MD5: 4809771 e6f2d90491ed050e5ff2104b617b88ea\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-common_1.3.9-2ubuntu6.1_all.deb\n Size/MD5: 1162340 88ad6900549400af9f75f927227d45cb\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-bsd_1.3.9-2ubuntu6.1_all.deb\n Size/MD5: 57652 7a33348b800c156e43a83e9083436bd5\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-client_1.3.9-2ubuntu6.1_all.deb\n Size/MD5: 57660 6c89ff2b1f7fe264b5caaaf986b36d9c\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-dbg_1.3.9-2ubuntu6.1_all.deb\n Size/MD5: 57652 ee1e3c3d68c190281678d7c1e7adadc9\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys_1.3.9-2ubuntu6.1_all.deb\n Size/MD5: 57656 2e8d25c423fbc2e265b0d56633ebc67d\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsys2-dev_1.3.9-2ubuntu6.1_all.deb\n Size/MD5: 57670 b0c0e0f336be70d0c458b45936f98d0d\n http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys-common_1.3.9-2ubuntu6.1_all.deb\n Size/MD5: 4530 23fb36af369fe018cd11fb3291dcc3cc\n http://security.ubuntu.com/ubuntu/pool/universe/c/cups/libcupsys2_1.3.9-2ubuntu6.1_all.deb\n Size/MD5: 57656 46de04530c997f729b7dce967559c8b3\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu6.1_amd64.deb\n Size/MD5: 37318 7c4c4cadb4f9b7f6e2c6080b790e6ee1\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-2ubuntu6.1_amd64.deb\n Size/MD5: 119788 72cab9079aeefee51e09a3b31ae592fa\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu6.1_amd64.deb\n Size/MD5: 1682518 3180c4e3fa3d5cfe0b2b894898485fdd\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu6.1_amd64.deb\n Size/MD5: 2172420 d7928f5c71b128511a0864db35ba6fe9\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu6.1_amd64.deb\n Size/MD5: 352208 ba6478c9d8f3712b0c1e648e48bbb0c3\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-2ubuntu6.1_amd64.deb\n Size/MD5: 172690 b2f7befc45ccf3bcd176186f9c48ceb1\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu6.1_amd64.deb\n Size/MD5: 61404 a16ecd777aca26b88c24d16b69e5f193\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu6.1_amd64.deb\n Size/MD5: 52392 7a9f6aabf047ad3225f8ec44d2fb5540\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu6.1_i386.deb\n Size/MD5: 36216 b4999abd3bf22b2963db0969b40da8e1\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-2ubuntu6.1_i386.deb\n Size/MD5: 115352 9ec804831b4557a4ada56602384ecc39\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu6.1_i386.deb\n Size/MD5: 1542016 c120e8f977f4b19be21e3b3067ca0df5\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu6.1_i386.deb\n Size/MD5: 2139174 18db7072b040bc4f3319b3b51361a239\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu6.1_i386.deb\n Size/MD5: 345996 53a7bdb95ee0b5d3b0f96c463710dadd\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-2ubuntu6.1_i386.deb\n Size/MD5: 169534 efa2f12acaf19bfab23d60478b5586cd\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu6.1_i386.deb\n Size/MD5: 60536 ceb4ded5423c0a25ddcc924d29e390f5\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu6.1_i386.deb\n Size/MD5: 51750 cf8f8190d6281a5881b8cc1922035758\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu6.1_lpia.deb\n Size/MD5: 36030 95ca36c48f733f3d709e94c2202e97db\n http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu6.1_lpia.deb\n Size/MD5: 114514 c44f5a21e630c130008be55aa258cb42\n http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu6.1_lpia.deb\n Size/MD5: 1571226 37ce539f88c38ba11a89515ddc188d2c\n http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu6.1_lpia.deb\n Size/MD5: 2135890 46cb00e52f60f8adc58496bc550a5ad9\n http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu6.1_lpia.deb\n Size/MD5: 342976 e14329c1e782470735f35422c592b473\n http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu6.1_lpia.deb\n Size/MD5: 167800 9cbad1fe09d9904ae6e026987d85731a\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu6.1_lpia.deb\n Size/MD5: 60672 8a5ca81cd3803ad98afe963360242177\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu6.1_lpia.deb\n Size/MD5: 52440 07bf6935608f398215f2880d5be9fd25\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu6.1_powerpc.deb\n Size/MD5: 43578 6876bb9233cf8352dfbf66bc95ddf7e9\n http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu6.1_powerpc.deb\n Size/MD5: 138186 b3868a2e0d935a95e9083773859f1cbe\n http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu6.1_powerpc.deb\n Size/MD5: 1663458 2bf2dae0699cf7dc45889dc678f20fcc\n http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu6.1_powerpc.deb\n Size/MD5: 2264178 b5b51d8116a46689275f98ea94e946af\n http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu6.1_powerpc.deb\n Size/MD5: 347972 af66fd54a390946c7b676cf54cb6e22e\n http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu6.1_powerpc.deb\n Size/MD5: 176964 0605e8b21a449afea97a3f5060af63e1\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu6.1_powerpc.deb\n Size/MD5: 61336 79c4d467e37c334effe0b5ee31238901\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu6.1_powerpc.deb\n Size/MD5: 57492 a6d2f97d74132b1f2a40599398ecd9b1\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu6.1_sparc.deb\n Size/MD5: 37220 31f862d50b31324596054730ea09f7d3\n http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu6.1_sparc.deb\n Size/MD5: 117632 b594a8cb5b194fef18a0393968fe0736\n http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu6.1_sparc.deb\n Size/MD5: 1490260 01fcb6d2d1c062dcdfd6cde440ef2a98\n http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu6.1_sparc.deb\n Size/MD5: 2200956 ebfffd46f41befdda3e30e3cb1ab521e\n http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu6.1_sparc.deb\n Size/MD5: 344800 6192418a2f2625f81551e9839d1187b4\n http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu6.1_sparc.deb\n Size/MD5: 165706 5804589b4f9bcc3bf016e3394f7acb7f\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu6.1_sparc.deb\n Size/MD5: 57906 34fef3b4e0a01df4a76c92768a8c292e\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu6.1_sparc.deb\n Size/MD5: 49792 24e09a0af0155fd8a13ca3f1db035c6d\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-5286" }, { "db": "JVNDB", "id": "JVNDB-2008-002227" }, { "db": "CNNVD", "id": "CNNVD-200812-003" }, { "db": "BID", "id": "32518" }, { "db": "VULHUB", "id": "VHN-35411" }, { "db": "PACKETSTORM", "id": "72543" }, { "db": "PACKETSTORM", "id": "74292" }, { "db": "PACKETSTORM", "id": "63836" }, { "db": "PACKETSTORM", "id": "74291" }, { "db": "PACKETSTORM", "id": "72870" }, { "db": "PACKETSTORM", "id": "73749" } ], "trust": 3.06 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-5286", "trust": 3.3 }, { "db": "BID", "id": "32518", "trust": 2.8 }, { "db": "SECUNIA", "id": "33101", "trust": 2.5 }, { "db": "VUPEN", "id": "ADV-2008-3315", "trust": 2.5 }, { "db": "SECUNIA", "id": "32962", "trust": 1.7 }, { "db": "SECUNIA", "id": "33111", "trust": 1.7 }, { "db": "SECUNIA", "id": "33568", "trust": 1.7 }, { "db": "SECTRACK", "id": "1021298", "trust": 1.7 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2008/12/01/1", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2008-002227", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200812-003", "trust": 0.7 }, { "db": "GENTOO", "id": "GLSA-200812-11", "trust": 0.6 }, { "db": "GENTOO", "id": "GLSA-200812-01", "trust": 0.6 }, { "db": "MLIST", "id": "[OSS-SECURITY] 20081201 (SORT OF URGENT) CVE REQUEST -- CUPS (REPOST)", "trust": 0.6 }, { "db": "XF", "id": "46933", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1677", "trust": 0.6 }, { "db": "MANDRIVA", "id": "MDVSA-2009:028", "trust": 0.6 }, { "db": "MANDRIVA", "id": "MDVSA-2009:029", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2008:1028", "trust": 0.6 }, { "db": "CONFIRM", "id": "HTTP://SVN.EASYSW.COM/PUBLIC/CUPS/TRUNK/CHANGES-1.3.TXT", "trust": 0.6 }, { "db": "CONFIRM", "id": "HTTP://WWW.CUPS.ORG/STR.PHP?L2974", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SR:2009:002", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "74292", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "72543", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-35411", "trust": 0.1 }, { "db": "SECUNIA", "id": "28994", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "63836", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "74291", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "72870", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "73749", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-35411" }, { "db": "BID", "id": "32518" }, { "db": "JVNDB", "id": "JVNDB-2008-002227" }, { "db": "PACKETSTORM", "id": "72543" }, { "db": "PACKETSTORM", "id": "74292" }, { "db": "PACKETSTORM", "id": "63836" }, { "db": "PACKETSTORM", "id": "74291" }, { "db": "PACKETSTORM", "id": "72870" }, { "db": "PACKETSTORM", "id": "73749" }, { "db": "CNNVD", "id": "CNNVD-200812-003" }, { "db": "NVD", "id": "CVE-2008-5286" } ] }, "id": "VAR-200812-0322", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-35411" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T21:04:56.685000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "STR #2974", "trust": 0.8, "url": "http://www.cups.org/str.php?l2974" }, { "title": "1378", "trust": 0.8, "url": "http://www.miraclelinux.com/update/linux/list.php?errata_id=1378" }, { "title": "RHSA-2008:1028", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2008-1028.html" }, { "title": "RHSA-2008:1028", "trust": 0.8, "url": "https://www.jp.redhat.com/support/errata/rhsa/rhsa-2008-1028j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-002227" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-189", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-35411" }, { "db": "JVNDB", "id": "JVNDB-2008-002227" }, { "db": "NVD", "id": "CVE-2008-5286" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/32518" }, { "trust": 2.5, "url": "http://secunia.com/advisories/33101" }, { "trust": 2.0, "url": "http://svn.easysw.com/public/cups/trunk/changes-1.3.txt" }, { "trust": 2.0, "url": "http://www.cups.org/str.php?l2974" }, { "trust": 1.9, "url": "http://www.vupen.com/english/advisories/2008/3315" }, { "trust": 1.7, "url": "http://www.debian.org/security/2008/dsa-1677" }, { "trust": 1.7, "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml" }, { "trust": 1.7, "url": "http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2009:028" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2009:029" }, { "trust": 1.7, "url": "http://www.openwall.com/lists/oss-security/2008/12/01/1" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2008-1028.html" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1021298" }, { "trust": 1.7, "url": "http://secunia.com/advisories/32962" }, { "trust": 1.7, "url": "http://secunia.com/advisories/33111" }, { "trust": 1.7, "url": "http://secunia.com/advisories/33568" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10058" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46933" }, { "trust": 1.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5286" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-5286" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/46933" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/3315" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-5286" }, { "trust": 0.3, "url": "http://www.cups.org" }, { "trust": 0.2, "url": "http://www.mandriva.com/security/" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0032" }, { "trust": 0.2, "url": "http://secunia.com/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0032" }, { "trust": 0.2, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.2, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-5183" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-5184" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_hppa.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-common_1.2.7-4etch6_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_i386.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.2.7-4etch6_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch6_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_ia64.deb" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch6_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch6_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch6_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch6_arm.deb" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "https://psi.secunia.com/?page=changelog" }, { "trust": 0.1, "url": "https://psi.secunia.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/921/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/28994/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://www.cups.org/str.php?l2656" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5184" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5183" }, { "trust": 0.1, "url": "http://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-3639" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-3640" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3639" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3640" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-200812-11.xml" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-3641" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3641" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.12_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.9_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.12_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.9_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.3_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.9_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.9_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.12_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.12_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/c/cups/libcupsys2_1.3.9-2ubuntu6.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.12_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.3.7-1ubuntu3.3_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.12_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.12_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.3_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.12_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-bsd_1.3.9-2ubuntu6.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-dbg_1.3.9-2ubuntu6.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-2ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7.orig.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.9_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.12_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys_1.3.9-2ubuntu6.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.3.2-1ubuntu7.9_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-2ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.9_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu6.1.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.12_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.12_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.12_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.12_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.9_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-gnutls10_1.2.2-0ubuntu0.6.06.12_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.12_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-5377" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-common_1.3.9-2ubuntu6.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu6.1.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.12_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.9_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.12_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.3_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-2ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9.orig.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.9_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.12_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.3.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.9_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.12_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.12_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.12_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.12_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-2ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.12_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.12_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsys2-dev_1.3.9-2ubuntu6.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.9_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.3_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.12_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-client_1.3.9-2ubuntu6.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys-common_1.3.9-2ubuntu6.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.12_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.3_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.3_lpia.deb" } ], "sources": [ { "db": "VULHUB", "id": "VHN-35411" }, { "db": "BID", "id": "32518" }, { "db": "JVNDB", "id": "JVNDB-2008-002227" }, { "db": "PACKETSTORM", "id": "72543" }, { "db": "PACKETSTORM", "id": "74292" }, { "db": "PACKETSTORM", "id": "63836" }, { "db": "PACKETSTORM", "id": "74291" }, { "db": "PACKETSTORM", "id": "72870" }, { "db": "PACKETSTORM", "id": "73749" }, { "db": "CNNVD", "id": "CNNVD-200812-003" }, { "db": "NVD", "id": "CVE-2008-5286" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-35411" }, { "db": "BID", "id": "32518" }, { "db": "JVNDB", "id": "JVNDB-2008-002227" }, { "db": "PACKETSTORM", "id": "72543" }, { "db": "PACKETSTORM", "id": "74292" }, { "db": "PACKETSTORM", "id": "63836" }, { "db": "PACKETSTORM", "id": "74291" }, { "db": "PACKETSTORM", "id": "72870" }, { "db": "PACKETSTORM", "id": "73749" }, { "db": "CNNVD", "id": "CNNVD-200812-003" }, { "db": "NVD", "id": "CVE-2008-5286" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-12-01T00:00:00", "db": "VULHUB", "id": "VHN-35411" }, { "date": "2008-11-28T00:00:00", "db": "BID", "id": "32518" }, { "date": "2009-01-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-002227" }, { "date": "2008-12-02T22:00:23", "db": "PACKETSTORM", "id": "72543" }, { "date": "2009-01-25T19:48:03", "db": "PACKETSTORM", "id": "74292" }, { "date": "2008-02-21T04:22:27", "db": "PACKETSTORM", "id": "63836" }, { "date": "2009-01-25T19:47:19", "db": "PACKETSTORM", "id": "74291" }, { "date": "2008-12-10T23:04:12", "db": "PACKETSTORM", "id": "72870" }, { "date": "2009-01-12T20:10:14", "db": "PACKETSTORM", "id": "73749" }, { "date": "2008-11-28T00:00:00", "db": "CNNVD", "id": "CNNVD-200812-003" }, { "date": "2008-12-01T15:30:03.640000", "db": "NVD", "id": "CVE-2008-5286" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-09-29T00:00:00", "db": "VULHUB", "id": "VHN-35411" }, { "date": "2015-03-19T08:34:00", "db": "BID", "id": "32518" }, { "date": "2009-01-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-002227" }, { "date": "2009-03-03T00:00:00", "db": "CNNVD", "id": "CNNVD-200812-003" }, { "date": "2017-09-29T01:32:32.477000", "db": "NVD", "id": "CVE-2008-5286" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "72870" }, { "db": "CNNVD", "id": "CNNVD-200812-003" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CUPS of _cupsImageReadPNG Integer overflow vulnerability in functions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-002227" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200812-003" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.