Action not permitted
Modal body text goes here.
cve-2009-0949
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:57:17.124Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35169", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35169" }, { "name": "DSA-1811", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1811" }, { "name": "35340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35340" }, { "name": "oval:org.mitre.oval:def:9631", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9631" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500972" }, { "name": "35342", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35342" }, { "name": "apple-cups-ipptag-dos(50926)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50926" }, { "name": "APPLE-SA-2009-09-10-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" }, { "name": "USN-780-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-780-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability" }, { "name": "35328", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35328" }, { "name": "RHSA-2009:1082", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1082.html" }, { "name": "35685", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35685" }, { "name": "SUSE-SR:2009:012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3865" }, { "name": "36701", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36701" }, { "name": "20090602 CORE-2009-0420 - Apple CUPS IPP_TAG_UNSUPPORTED Handling null pointer Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/504032/100/0/threaded" }, { "name": "RHSA-2009:1083", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1083.html" }, { "name": "1022321", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1022321" }, { "name": "35322", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35322" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-06-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35169", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35169" }, { "name": "DSA-1811", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1811" }, { "name": "35340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35340" }, { "name": "oval:org.mitre.oval:def:9631", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9631" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500972" }, { "name": "35342", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35342" }, { "name": "apple-cups-ipptag-dos(50926)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50926" }, { "name": "APPLE-SA-2009-09-10-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" }, { "name": "USN-780-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-780-1" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability" }, { "name": "35328", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35328" }, { "name": "RHSA-2009:1082", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1082.html" }, { "name": "35685", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35685" }, { "name": "SUSE-SR:2009:012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3865" }, { "name": "36701", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36701" }, { "name": "20090602 CORE-2009-0420 - Apple CUPS IPP_TAG_UNSUPPORTED Handling null pointer Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/504032/100/0/threaded" }, { "name": "RHSA-2009:1083", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1083.html" }, { "name": "1022321", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1022321" }, { "name": "35322", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35322" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0949", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35169", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35169" }, { "name": "DSA-1811", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1811" }, { "name": "35340", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35340" }, { "name": "oval:org.mitre.oval:def:9631", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9631" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=500972", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500972" }, { "name": "35342", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35342" }, { "name": "apple-cups-ipptag-dos(50926)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50926" }, { "name": "APPLE-SA-2009-09-10-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" }, { "name": "USN-780-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-780-1" }, { "name": "http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability", "refsource": "MISC", "url": "http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability" }, { "name": "35328", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35328" }, { "name": "RHSA-2009:1082", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1082.html" }, { "name": "35685", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35685" }, { "name": "SUSE-SR:2009:012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" }, { "name": "http://support.apple.com/kb/HT3865", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3865" }, { "name": "36701", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36701" }, { "name": "20090602 CORE-2009-0420 - Apple CUPS IPP_TAG_UNSUPPORTED Handling null pointer Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/504032/100/0/threaded" }, { "name": "RHSA-2009:1083", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1083.html" }, { "name": "1022321", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1022321" }, { "name": "35322", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35322" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0949", "datePublished": "2009-06-09T17:00:00", "dateReserved": "2009-03-18T00:00:00", "dateUpdated": "2024-08-07T04:57:17.124Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-0949\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-06-09T17:30:00.657\",\"lastModified\":\"2024-02-09T00:17:23.450\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n ippReadIO en cups/ipp.c en cupsd en CUPS antes de la versi\u00f3n 1.3.10 no inicia de manera apropiada la memoria para paquetes de solicitud IPP, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero nulo y ca\u00edda del demonio) mediante una solicitud de programaci\u00f3n (scheduler) con dos etiquetas IPP_TAG_UNSUPPORTED consecutivas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-908\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.3.10\",\"matchCriteriaId\":\"DB4D1818-1AE2-42FE-9856-5519EF7E0DAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"7EBFE35C-E243-43D1-883D-4398D71763CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4747CC68-FAF4-482F-929A-9DA6C24CB663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndExcluding\":\"10.4.11\",\"matchCriteriaId\":\"2F5DEE66-117C-4844-8FD4-065D0820A808\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.5.0\",\"versionEndExcluding\":\"10.5.8\",\"matchCriteriaId\":\"7A880FA4-5DBF-4894-8DAC-C3CD147D1EB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndExcluding\":\"10.4.11\",\"matchCriteriaId\":\"B9ACE85A-56A0-404C-AB58-A4F5CA73243C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.5.0\",\"versionEndExcluding\":\"10.5.8\",\"matchCriteriaId\":\"7F74FAC0-CC05-4797-9DE2-F7CE5CB8FC19\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35B68DF-1440-4587-8458-9C5F4D1E43F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3243C77-D635-480D-908C-328A479719E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"AED08A6F-CD23-4405-B1CF-C96BB8AE7D6B\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://secunia.com/advisories/35322\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35328\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35340\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35342\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35685\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/36701\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://securitytracker.com/id?1022321\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://support.apple.com/kb/HT3865\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1811\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1082.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1083.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/504032/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/35169\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-780-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=500972\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/50926\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9631\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]}]}}" } }
var-200906-0617
Vulnerability from variot
The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags. Common Unix Printing System(CUPS)是一款通用Unix打印系统,是Unix环境下的跨平台打印解决方案,基于Internet打印协议,提供大多数PostScript和raster打印机服务 . 在处理包含有两个IPP_TAG_UNSUPPORTED标签的特质IPP时,CUPS的cups/ipp.c文件中的ippReadIO()函数没有正确地初始化ipp结构,这可能导致受影响的应用崩溃 . cups/ipp.c文件中的ippReadIO()函数负责初始化表示当前IPP请求中不同标签的ipp结构:
/----------- 1016 ipp_state_t / O - Current state / 1017 ippReadIO(voidsrc, / I - Data source / 1018 ipp_iocb_tcb, / I - Read callback function / 1019 int blocking, / I - Use blocking IO? / 1020 ipp_t parent,/ I - Parent request, if any / 1021 ipp_t ipp) / I - IPP data / 1022 { 1023 int n;/ Length of data / 1024 unsignedchar buffer[IPP_MAX_LENGTH + 1], 1025 / Data buffer / 1026 string[IPP_MAX_NAME], 1027 / Small string buffer / 1028bufptr; / Pointer into buffer / 1029ipp_attribute_tattr; / Current attribute / 1030ipp_tag_t tag; / Current tag / 1031ipp_tag_t value_tag; / Current value tag / 1032ipp_value_t value;/ Current value / 1035DEBUG_printf((\"ippReadIO(\%p, \%p, \%d, \%p, \%p)\n\", src, cb, blocking, 1036parent, ipp)); 1037DEBUG_printf((\"ippReadIO: ipp->state=\%d\n\", ipp->state)); 1039if (src == NULL || ipp == NULL) 1040return (IPP_ERROR); 1041 1042switch (ipp->state) 1043{ 1044case IPP_IDLE : 1045ipp->state ++; / Avoid common problem... / 1046 1047case IPP_HEADER : 1048if (parent == NULL) - -----------/
在上面的代码中,通过几个不同的标签属性对报文进行计数。如果所发送的IPP报文标签属性低于0x10,CUPS就会认为是IPP_TAG_UNSUPPORTED标签:
/----------- else if (tag < IPP_TAG_UNSUPPORTED_VALUE) { / * Group tag...Set the current group and continue... / if (ipp->curtag == tag) ipp->prev = ippAddSeparator(ipp); else if (ipp->current) ipp->prev = ipp->current; ipp->curtag= tag; ipp->current = NULL; DEBUG_printf((\"ippReadIO: group tag = \%x, ipp->prev=\%p\n\", tag, ipp->prev)); continue; } - -----------/
由于CUPS处理这类标签的方式,如果报文中包含有两个连续的IPP_TAG_UNSUPPORTED,就会将IPP结构的最后一个节点初始化为NULL,这会在cupsdProcessIPPRequest函数试图读取attr结构的name字段时导致崩溃.
/----------- / * \'\'cupsdProcessIPPRequest()\'\' - Process an incoming IPP request. / int / O - 1 on success, 0 on failure / cupsdProcessIPPRequest( cupsd_client_t con)/ I - Client connection / ... if (!attr) { / * Then make sure that the first three attributes are: * * attributes-charset * attributes-natural-language * printer-uri/job-uri */
attr = con->request->attrs; if (attr && !strcmp(attr->name, \"attributes-charset\") && (attr->value_tag & IPP_TAG_MASK) == IPP_TAG_CHARSET) charset = attr; else charset = NULL; ... - -----------/. CUPS is prone to a denial-of-service vulnerability because of a NULL-pointer dereference that occurs when processing two consecutive IPP_TAG_UNSUPPORTED tags in specially crafted IPP (Internet Printing Protocal) packets. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. It is based on the Internet Printing Protocol and provides most PostScript and raster printer services. The ippReadIO() function in CUPS's cups/ipp.c file did not properly initialize the ipp structure when processing a idiosyncratic IPP that contained two IPP_TAG_UNSUPPORTED tags, which could crash the affected application. =========================================================== Ubuntu Security Notice USN-780-1 June 03, 2009 cups, cupsys vulnerability CVE-2009-0949 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: cupsys 1.2.2-0ubuntu0.6.06.14
Ubuntu 8.04 LTS: cupsys 1.3.7-1ubuntu3.5
Ubuntu 8.10: cups 1.3.9-2ubuntu9.2
Ubuntu 9.04: cups 1.3.9-17ubuntu3.1
In general, a standard system upgrade is sufficient to effect the necessary changes.
Details follow:
Anibal Sacco discovered that CUPS did not properly handle certain network operations.
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14.diff.gz
Size/MD5: 101447 1edf4eb6127965001092ac72fc5743ea
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14.dsc
Size/MD5: 1060 4843503dffb5c5268a64499cb2cf279e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2.orig.tar.gz
Size/MD5: 4070384 2c99b8aa4c8dc25c8a84f9c06aa52e3e
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-gnutls10_1.2.2-0ubuntu0.6.06.14_all.deb
Size/MD5: 998 ee02e19aab490d9d97b6d3eb0f0808e4
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.14_amd64.deb
Size/MD5: 36236 8f3c604623813d67800c2f06686ccd1b
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.14_amd64.deb
Size/MD5: 81894 166216227002808778e9a01798409a37
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14_amd64.deb
Size/MD5: 2287028 141ace9ca050db86cdef9b44e620c13b
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.14_amd64.deb
Size/MD5: 6094 f338b2ae622333497e2cda10f26590e9
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.14_amd64.deb
Size/MD5: 77648 40846208a23006cab7c7bd52813a6343
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.14_amd64.deb
Size/MD5: 25756 5b703a78f78465181f785715ef7036cc
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.14_amd64.deb
Size/MD5: 130344 6c9d54d7f6c8069d8d69652bf6dbddd7
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.14_i386.deb
Size/MD5: 34762 08037502d74a512a07b184c2999d32ad
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.14_i386.deb
Size/MD5: 77992 260347aa2b7f4ec59fcaa1d29a16e0c3
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14_i386.deb
Size/MD5: 2254260 49e00eabc519426ee5413864c4bdb251
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.14_i386.deb
Size/MD5: 6092 0a515dd0fdd48eb70da0b5bfe3019f08
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.14_i386.deb
Size/MD5: 76752 7ee453f379433e22b9451e6282669797
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.14_i386.deb
Size/MD5: 25740 28af462a2e8f13620bb1b70cef1cd08e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.14_i386.deb
Size/MD5: 122538 200a588a83e668f621ca41bc41a13413
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.14_powerpc.deb
Size/MD5: 40462 3937e3b6cb8f6cda2f1e450518a4e136
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.14_powerpc.deb
Size/MD5: 89516 bf845949727422d0ae4d550966d34c72
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14_powerpc.deb
Size/MD5: 2301634 8bf6a7e2fcff62817459186c189673d1
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.14_powerpc.deb
Size/MD5: 6094 cb2ff11f6c55d69b99f39e64ad399774
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.14_powerpc.deb
Size/MD5: 79292 b137122dde7459d5653e024b4d3b5852
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.14_powerpc.deb
Size/MD5: 25744 7765abc3cea993a82a638458202892e5
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.14_powerpc.deb
Size/MD5: 128304 69634210a2fa2a8af2383a12b657a568
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.14_sparc.deb
Size/MD5: 35390 f4a5a9207d6494c05a7820cdbf2cadf9
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.14_sparc.deb
Size/MD5: 78720 423336f4bf4be9292f49f31ab6cac3dc
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14_sparc.deb
Size/MD5: 2287900 4833fae9ab11ecd3721faef405ad8167
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.14_sparc.deb
Size/MD5: 6094 ebae0d6eb86d9e3f4fff77c860f1693c
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.14_sparc.deb
Size/MD5: 76568 7d1814766e366021fc136cb6577880b9
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.14_sparc.deb
Size/MD5: 25746 a4eacdcf7d078a8200660cf0bb37c694
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.14_sparc.deb
Size/MD5: 124034 6fd4c6c86596379e32fc228ed15cf4dc
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5.diff.gz
Size/MD5: 135129 091bf3e7ac7e1a1f074dc15d08c2c4d5
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5.dsc
Size/MD5: 1441 9cf7f2d9b00a22af8e8ccdfbe234fd8e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7.orig.tar.gz
Size/MD5: 4700333 383e556d9841475847da6076c88da467
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.3.7-1ubuntu3.5_all.deb
Size/MD5: 1144240 9c3908b1639d493bcc580368adbfa3a3
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.5_amd64.deb
Size/MD5: 37530 c252102dbd39005b010fff629e4daf2c
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.5_amd64.deb
Size/MD5: 89980 2d95b8b2a44cfa62603335d6211f5fd1
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5_amd64.deb
Size/MD5: 1880552 e94141a55ae34eb9ac5be1b941268f5b
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.5_amd64.deb
Size/MD5: 60804 9e8d5476cccb6ea9ac0d0eaf1db9c615
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.5_amd64.deb
Size/MD5: 50216 5de274a35fa3cbea87c9245b179364b5
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.5_amd64.deb
Size/MD5: 344920 6a966e90749cbaf815c511717b84abaa
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.5_amd64.deb
Size/MD5: 178092 3d4bda40ecf7c2091cc173b79658d6c9
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.5_i386.deb
Size/MD5: 36952 2c6053368cf2a00f66197eca444af3b5
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.5_i386.deb
Size/MD5: 88394 0c572acada7273e30b15bcb3cc2874cb
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5_i386.deb
Size/MD5: 1863054 68e5cbd5fd1ed11bee4fef0c4e79de7f
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.5_i386.deb
Size/MD5: 60082 062ad31917eedc6e5003e990807d838b
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.5_i386.deb
Size/MD5: 49852 9ac15961d63d2fd6f4ce702e688a8985
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.5_i386.deb
Size/MD5: 339354 8b842a2c754dc36a307aa64e613fe4c7
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.5_i386.deb
Size/MD5: 174938 58ab39cc15878a158487fb858af9958d
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.5_lpia.deb
Size/MD5: 36658 536346a17e6b5035307bdf1ce04b3799
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.5_lpia.deb
Size/MD5: 88744 2141679378e4e3700c78c09ec936e1da
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5_lpia.deb
Size/MD5: 1865310 094ffb6f741440a18fca28d50b29ead0
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.5_lpia.deb
Size/MD5: 60488 8681c7ebbe8e781fb7b3348b00da9de9
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.5_lpia.deb
Size/MD5: 50808 dce50fc21c292b77ff3d0f21946cf23e
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.5_lpia.deb
Size/MD5: 337014 84ca26401f9ae81f3d9f535f0361dd0c
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.5_lpia.deb
Size/MD5: 173878 1f3e4888d7cf574b1c62aa092c852b8a
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.5_powerpc.deb
Size/MD5: 46918 6e9a925312380561f2299f66cb134357
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.5_powerpc.deb
Size/MD5: 110820 b7b8c667cf96cfe0d60c1f2d1ba96628
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5_powerpc.deb
Size/MD5: 1949102 2d78cac8f6b3c758ac337c791de433a3
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.5_powerpc.deb
Size/MD5: 59926 0c7f18be806b6467c39dd1955c6e4685
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.5_powerpc.deb
Size/MD5: 54920 9403a69f365361e033707d5914a92f52
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.5_powerpc.deb
Size/MD5: 341668 0ee868915ef0bd3e177244f931ec7b5d
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.5_powerpc.deb
Size/MD5: 183836 e45a7d338ce136c48abf6c5cce3b6f6b
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.5_sparc.deb
Size/MD5: 38028 e556e3eecc385e35b5c790046f91cec9
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.5_sparc.deb
Size/MD5: 91034 84e2052f3fd9e57363b13779fe3fb30f
http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5_sparc.deb
Size/MD5: 1897852 30481f2e4dff5ba7e8d465d0771360c8
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.5_sparc.deb
Size/MD5: 57826 72589c6d350921d2ac7d5a4207c5b78a
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.5_sparc.deb
Size/MD5: 48216 59e887dda48b748158c7083d50fb6405
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.5_sparc.deb
Size/MD5: 341372 0976433618733b76b21104715594256e
http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.5_sparc.deb
Size/MD5: 173768 853ddf9a445d28cdf2740957676b50cd
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu9.2.diff.gz
Size/MD5: 329287 0f1eabafd9f35ce1c7103f131976af91
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu9.2.dsc
Size/MD5: 2043 5c406df0ddf6c7f849147bbccb4350bb
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9.orig.tar.gz
Size/MD5: 4809771 e6f2d90491ed050e5ff2104b617b88ea
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-common_1.3.9-2ubuntu9.2_all.deb
Size/MD5: 1162826 78ce799e56015d07969aea1b1e5750fe
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-bsd_1.3.9-2ubuntu9.2_all.deb
Size/MD5: 58238 c04c758e79b5d28dec48637c8c73b549
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-client_1.3.9-2ubuntu9.2_all.deb
Size/MD5: 58252 588dfe9e578fb1a17daf2faa5fab8774
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-dbg_1.3.9-2ubuntu9.2_all.deb
Size/MD5: 58244 0fa4c07b2e66a7d0c106071d283d7edc
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys_1.3.9-2ubuntu9.2_all.deb
Size/MD5: 58236 f163f465b79566c194364d14ebb49608
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsys2-dev_1.3.9-2ubuntu9.2_all.deb
Size/MD5: 58252 afd476b79ec34e694d19f360a2cbc64c
http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys-common_1.3.9-2ubuntu9.2_all.deb
Size/MD5: 4526 bd17a9f9600e53f3c5ce3b18a2cae590
http://security.ubuntu.com/ubuntu/pool/universe/c/cups/libcupsys2_1.3.9-2ubuntu9.2_all.deb
Size/MD5: 58240 b1702f69d74e496859096eb6101e5139
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu9.2_amd64.deb
Size/MD5: 37300 2e18f255477200b6320afa7e6903508f
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-2ubuntu9.2_amd64.deb
Size/MD5: 119744 9c484968a2250bd303c305df9d53943f
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu9.2_amd64.deb
Size/MD5: 1682962 e7fa53ce69537cd609e8d88e1873e9cc
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu9.2_amd64.deb
Size/MD5: 2172504 b4d5b2ce9603e2b36374b100dbf9ada7
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu9.2_amd64.deb
Size/MD5: 352190 8bbf84d00818cf88c0f3d048fa425cf1
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-2ubuntu9.2_amd64.deb
Size/MD5: 173268 01abbe7f859eef7e9e5d453792b96f76
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu9.2_amd64.deb
Size/MD5: 61314 73a75d935ccb41f7827bfeff0bf8f9ec
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu9.2_amd64.deb
Size/MD5: 52312 263e4265a47473eff3b416b896907103
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu9.2_i386.deb
Size/MD5: 36226 c8d3d0df62f93d519369f37ab0d337bf
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-2ubuntu9.2_i386.deb
Size/MD5: 115328 65483c26c3e0efe02922a59beeb0d833
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu9.2_i386.deb
Size/MD5: 1542716 c3737d9cfb6277985baf83bf4a449150
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu9.2_i386.deb
Size/MD5: 2139250 edef8688cd2fe57ac989b4bad50022ac
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu9.2_i386.deb
Size/MD5: 345992 e4adcaea69f8ae947f1ca0b63af74ffd
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-2ubuntu9.2_i386.deb
Size/MD5: 170194 fd8ab14aafda63f2f41cbd4885be0d81
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu9.2_i386.deb
Size/MD5: 60534 5064205f7a26e8ed1a543932e6aad79e
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu9.2_i386.deb
Size/MD5: 51718 e663a435f42d39438e5fdf1ed599c7cb
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu9.2_lpia.deb
Size/MD5: 36014 b9a880feca8d481df4f9495cec8b8121
http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu9.2_lpia.deb
Size/MD5: 114512 1617fc04bc3c063dcb8bbc884050c6b2
http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu9.2_lpia.deb
Size/MD5: 1571962 7b061e95651696885125af95d7b08532
http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu9.2_lpia.deb
Size/MD5: 2135962 8695e326f9876ed3c3012becfaeed0f4
http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu9.2_lpia.deb
Size/MD5: 342968 9887c91b3ac9427b240317f6eb6d8bf0
http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu9.2_lpia.deb
Size/MD5: 168430 e13502a0fda3165d41d92f156f2ade21
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu9.2_lpia.deb
Size/MD5: 60630 63b43b5b90c7f271d8ffc491d50c77e0
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu9.2_lpia.deb
Size/MD5: 52386 f0ee10297823f8aa39049a1f9cff34bb
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu9.2_powerpc.deb
Size/MD5: 43564 e3d68dd451cae339f4629e36363e27b4
http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu9.2_powerpc.deb
Size/MD5: 138160 8d11bd04570c0738af0b35ecef8ca018
http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu9.2_powerpc.deb
Size/MD5: 1663540 3f5d9437ffe6df630cde4ad4b4fbbe35
http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu9.2_powerpc.deb
Size/MD5: 2264222 6c49653a70198b67692c220135fe5428
http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu9.2_powerpc.deb
Size/MD5: 347966 72a14e0a64f503365475c436fa45ac39
http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu9.2_powerpc.deb
Size/MD5: 177464 2615af3dce1a5b56c001adcbab649264
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu9.2_powerpc.deb
Size/MD5: 61256 b021d0be4915346dfc22203556c56ce4
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu9.2_powerpc.deb
Size/MD5: 57436 a9463cb0014dba068fe6ad3dd05b7693
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu9.2_sparc.deb
Size/MD5: 37216 b30aec0d4f3cff1d59594c1272002e93
http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu9.2_sparc.deb
Size/MD5: 117640 35ca75a0021841529ed85691ba0496bc
http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu9.2_sparc.deb
Size/MD5: 1490704 f143b16a5a811b517cc968d9e628feb9
http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu9.2_sparc.deb
Size/MD5: 2200938 91b1621927bd5feb83bd1dd8fa20005d
http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu9.2_sparc.deb
Size/MD5: 344786 c5e02a1f344ddc4e10b91b255ac869dd
http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu9.2_sparc.deb
Size/MD5: 166318 e6bfc6840275b954311c4544667d6193
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu9.2_sparc.deb
Size/MD5: 57848 f4c6f5c70fd1ec7a95c322186e86c487
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu9.2_sparc.deb
Size/MD5: 49796 52f0c961942e4a0b8e85ed3b6d4953a4
Updated packages for Ubuntu 9.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-17ubuntu3.1.diff.gz
Size/MD5: 331113 386644ef646604fa3ea0f18a3440dd94
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-17ubuntu3.1.dsc
Size/MD5: 1984 974758acb855004824caa579913a402f
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9.orig.tar.gz
Size/MD5: 4809771 e6f2d90491ed050e5ff2104b617b88ea
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-common_1.3.9-17ubuntu3.1_all.deb
Size/MD5: 1165116 0fea2201baecec1a63153ca024cf85b3
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-dbg_1.3.9-17ubuntu3.1_all.deb
Size/MD5: 60220 78f1df511789d7c6fa564df73ae3737e
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsys2-dev_1.3.9-17ubuntu3.1_all.deb
Size/MD5: 60230 dd363c3548b1d7bab16bb595ac2d8682
http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys-bsd_1.3.9-17ubuntu3.1_all.deb
Size/MD5: 60222 3fe72599089459e0533070ee35696c96
http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys-client_1.3.9-17ubuntu3.1_all.deb
Size/MD5: 60218 33922120f0f3b6d755691c6cd31a983a
http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys-common_1.3.9-17ubuntu3.1_all.deb
Size/MD5: 4520 4944980239da17a124a13b5eb08814af
http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys_1.3.9-17ubuntu3.1_all.deb
Size/MD5: 60204 578a4a096679845a551abab4687ecd07
http://security.ubuntu.com/ubuntu/pool/universe/c/cups/libcupsys2_1.3.9-17ubuntu3.1_all.deb
Size/MD5: 60220 404eae856385b1def832fb0474551e51
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-17ubuntu3.1_amd64.deb
Size/MD5: 37310 824835ae3f5e791b0ced4e0bfa0094aa
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-17ubuntu3.1_amd64.deb
Size/MD5: 119750 d3562b6435de311fdfdd3f5a433beafe
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-17ubuntu3.1_amd64.deb
Size/MD5: 1658120 811f80a88d0fdcee20f41383b313d073
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-17ubuntu3.1_amd64.deb
Size/MD5: 2168616 178ada0830fa6b64f1b2a28f43ba68d5
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-17ubuntu3.1_amd64.deb
Size/MD5: 352130 b9502f3daaa52d057a815e6a11433707
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-17ubuntu3.1_amd64.deb
Size/MD5: 177068 fedd91d5e3094e813b85c910e6f950ab
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-17ubuntu3.1_amd64.deb
Size/MD5: 61260 68d03afa62ffd74aa517c588cd32017d
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-17ubuntu3.1_amd64.deb
Size/MD5: 52220 715bc18c530db346e2faad81789af0a0
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-17ubuntu3.1_i386.deb
Size/MD5: 36212 f8a3d3701b170c1637b469b1abcde7c6
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-17ubuntu3.1_i386.deb
Size/MD5: 115324 062953a515a6c8b27c75c7539472f9f4
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-17ubuntu3.1_i386.deb
Size/MD5: 1517622 a3c1f3ad98db97230d25ba20acfa4c11
http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-17ubuntu3.1_i386.deb
Size/MD5: 2134800 0cde4fc0fac7b7682f0a53f38caedbc4
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-17ubuntu3.1_i386.deb
Size/MD5: 345990 2bc3076c1ad6c67c5858f62714ab4a3b
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-17ubuntu3.1_i386.deb
Size/MD5: 173740 c44041d8784eae4ac9400a0d3b9b9138
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-17ubuntu3.1_i386.deb
Size/MD5: 60488 c923e354bf04dbafff5339ea6d18433e
http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-17ubuntu3.1_i386.deb
Size/MD5: 51530 b03604b87ea464a7f97e26272582ee18
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-17ubuntu3.1_lpia.deb
Size/MD5: 36032 2be317cc9206baaff256b4325072589a
http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-17ubuntu3.1_lpia.deb
Size/MD5: 114486 8c27d1961b1aa8a73f3c342ae6ae92f8
http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-17ubuntu3.1_lpia.deb
Size/MD5: 1546154 0d3adaac793d357587ce7cc4275fe55f
http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-17ubuntu3.1_lpia.deb
Size/MD5: 2132166 9ae39e3c42178dd9b384fc8bc8a13d82
http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-17ubuntu3.1_lpia.deb
Size/MD5: 342936 2cff2dcc4b5cd9e54046bd97f2ca1bed
http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-17ubuntu3.1_lpia.deb
Size/MD5: 171954 a2ea14f0324efa3d936f8a31730d0c9d
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-17ubuntu3.1_lpia.deb
Size/MD5: 60678 4594a7764c86b427ff76b2700a294ddc
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-17ubuntu3.1_lpia.deb
Size/MD5: 52340 86b3bb0d4279f78231d1bdd0e1dbc3fb
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-17ubuntu3.1_powerpc.deb
Size/MD5: 43578 302e5e3849b99d0a12e2ff4f96be71d1
http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-17ubuntu3.1_powerpc.deb
Size/MD5: 138164 5e62e249891ed196a7eb21466205fd7b
http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-17ubuntu3.1_powerpc.deb
Size/MD5: 1633586 15e374d5ff627a56713f2a7ce61ef616
http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-17ubuntu3.1_powerpc.deb
Size/MD5: 2256002 66dd6a9c74b750671c86e90163941953
http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-17ubuntu3.1_powerpc.deb
Size/MD5: 347906 cb12b0143262bdbe01a6e69584947228
http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-17ubuntu3.1_powerpc.deb
Size/MD5: 182450 c07ea0fed64ca677713c8a9362a38467
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-17ubuntu3.1_powerpc.deb
Size/MD5: 61302 934f995a352040b03daf4b4462da2892
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-17ubuntu3.1_powerpc.deb
Size/MD5: 57414 31f122cc6a44e90c362dda241b98648c
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-17ubuntu3.1_sparc.deb
Size/MD5: 37204 d11aa276b3c4049110c587b2131d1207
http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-17ubuntu3.1_sparc.deb
Size/MD5: 117558 c29f382879fce337b440b71cb3a88b3d
http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-17ubuntu3.1_sparc.deb
Size/MD5: 1462180 9c40f63f4c088299eec0d97317c53a3a
http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-17ubuntu3.1_sparc.deb
Size/MD5: 2201794 00f9c319e7fd6b9eeed508baba656d21
http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-17ubuntu3.1_sparc.deb
Size/MD5: 344712 9f8df2c64cff337847abca91c4e3fb1f
http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-17ubuntu3.1_sparc.deb
Size/MD5: 169558 555c2de1cc4ff90754500bb42947453e
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-17ubuntu3.1_sparc.deb
Size/MD5: 57850 d5d1dc89040b20f04c6a99d14524a6d1
http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-17ubuntu3.1_sparc.deb
Size/MD5: 49686 46af0e0b82ed5cc1d562909eacd9a35c
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2009:282-1 http://www.mandriva.com/security/
Package : cups Date : December 7, 2009 Affected: 2008.0
Problem Description:
Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap. (CVE-2009-0163)
Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, as used in Poppler and other products, when running on Mac OS X, has unspecified impact, related to g*allocn. (CVE-2009-0166)
Heap-based buffer overflow in Xpdf 3.02pl2 and earlier, CUPS 1.3.9, and probably other products, allows remote attackers to execute arbitrary code via a PDF file with crafted JBIG2 symbol dictionary segments (CVE-2009-0195). NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179. (CVE-2009-0799)
Multiple input validation flaws in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file. (CVE-2009-0949)
Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file. (CVE-2009-1179)
The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data. (CVE-2009-1181)
Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file. (CVE-2009-1182)
The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file. (CVE-2009-1183)
Two integer overflow flaws were found in the CUPS pdftops filter. An attacker could create a malicious PDF file that would cause pdftops to crash or, potentially, execute arbitrary code as the lp user if the file was printed. (CVE-2009-3608, CVE-2009-3609)
This update corrects the problems.
Update:
Packages for 2008.0 are being provided due to extended support for Corporate products.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609
Updated Packages:
Mandriva Linux 2008.0: 6b17f59f63c062c017c78d459dd2d89a 2008.0/i586/cups-1.3.10-0.1mdv2008.0.i586.rpm 9bc5298d9895c356227fdda3a0ddb2c0 2008.0/i586/cups-common-1.3.10-0.1mdv2008.0.i586.rpm e3583883df8532fc8c496866dac713f8 2008.0/i586/cups-serial-1.3.10-0.1mdv2008.0.i586.rpm fac1fcb839ad53322a447d4d39f769e3 2008.0/i586/libcups2-1.3.10-0.1mdv2008.0.i586.rpm 3d65afc590fb8520d68b2a3e8e1da696 2008.0/i586/libcups2-devel-1.3.10-0.1mdv2008.0.i586.rpm 9e09ed22a2522ee45e93e0edc146193f 2008.0/i586/libpoppler2-0.6-3.5mdv2008.0.i586.rpm 7427b1f56387e84db5a15aad85b424d2 2008.0/i586/libpoppler-devel-0.6-3.5mdv2008.0.i586.rpm 67937a584d365d6b00ef688c88e8d7c5 2008.0/i586/libpoppler-glib2-0.6-3.5mdv2008.0.i586.rpm 410dc85c2c7b71ab316be5607c556682 2008.0/i586/libpoppler-glib-devel-0.6-3.5mdv2008.0.i586.rpm 64d6e14be8d93c7651ce5dc3e2ebc5bf 2008.0/i586/libpoppler-qt2-0.6-3.5mdv2008.0.i586.rpm cc9af7e314b6eaa6a8f946fa2c27f298 2008.0/i586/libpoppler-qt4-2-0.6-3.5mdv2008.0.i586.rpm 0c6d3a6b5211e8506a89144b8c3a3cfb 2008.0/i586/libpoppler-qt4-devel-0.6-3.5mdv2008.0.i586.rpm c985516638ed4d8f792daa13bd506023 2008.0/i586/libpoppler-qt-devel-0.6-3.5mdv2008.0.i586.rpm 8d05619dcef538092696ce70998abd20 2008.0/i586/php-cups-1.3.10-0.1mdv2008.0.i586.rpm 0bae2a3525b796882d2cc87853945e5a 2008.0/i586/poppler-0.6-3.5mdv2008.0.i586.rpm f3b53f5fafa8af4d754a5985e5f93830 2008.0/SRPMS/cups-1.3.10-0.1mdv2008.0.src.rpm 11b021f4e5d21d199728b9a0a37a8230 2008.0/SRPMS/poppler-0.6-3.5mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64: 8249475feb3bdc74ea7060944baed6aa 2008.0/x86_64/cups-1.3.10-0.1mdv2008.0.x86_64.rpm 83951504acb783cfdb8ec4fe48d31e1e 2008.0/x86_64/cups-common-1.3.10-0.1mdv2008.0.x86_64.rpm fa8a91e8e3bc8f11c19ab460d1f690fe 2008.0/x86_64/cups-serial-1.3.10-0.1mdv2008.0.x86_64.rpm e061fdbeded2d97bb3ca6b34d33cb384 2008.0/x86_64/lib64cups2-1.3.10-0.1mdv2008.0.x86_64.rpm 893235ea8cf23295ae961ea2de0b9903 2008.0/x86_64/lib64cups2-devel-1.3.10-0.1mdv2008.0.x86_64.rpm 9844640563afdef4a870e2ed12e58136 2008.0/x86_64/lib64poppler2-0.6-3.5mdv2008.0.x86_64.rpm 06ea824a6a2cd9360a9e75a14718192a 2008.0/x86_64/lib64poppler-devel-0.6-3.5mdv2008.0.x86_64.rpm bb0eb04fa906a352e6738d08f116f89b 2008.0/x86_64/lib64poppler-glib2-0.6-3.5mdv2008.0.x86_64.rpm 43d6a85dfdad7e969655ee4e2a377370 2008.0/x86_64/lib64poppler-glib-devel-0.6-3.5mdv2008.0.x86_64.rpm eef29dde4b9e80d4c360e953cbe9110b 2008.0/x86_64/lib64poppler-qt2-0.6-3.5mdv2008.0.x86_64.rpm c74dc9f245091f451441d8b88f0beed3 2008.0/x86_64/lib64poppler-qt4-2-0.6-3.5mdv2008.0.x86_64.rpm 60345458274afc6ff480317fc408ec52 2008.0/x86_64/lib64poppler-qt4-devel-0.6-3.5mdv2008.0.x86_64.rpm 0a880b9c0d655c10f5757882e30911f1 2008.0/x86_64/lib64poppler-qt-devel-0.6-3.5mdv2008.0.x86_64.rpm eb6fde793ac0d7ea86df42aa22637807 2008.0/x86_64/php-cups-1.3.10-0.1mdv2008.0.x86_64.rpm 7f475f07368ed9158008f2891dce2cd6 2008.0/x86_64/poppler-0.6-3.5mdv2008.0.x86_64.rpm f3b53f5fafa8af4d754a5985e5f93830 2008.0/SRPMS/cups-1.3.10-0.1mdv2008.0.src.rpm 11b021f4e5d21d199728b9a0a37a8230 2008.0/SRPMS/poppler-0.6-3.5mdv2008.0.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFLHXsgmqjQ0CJFipgRAu1fAKCINX1H5StX89GjMDWzGrEM1UiHeACeMLSY a3mQtrfvoibfn29OFAfdSn0= =lTbL -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ .
For the oldstable distribution (etch), this problem has been fixed in version 1.2.7-4+etch8 of cupsys.
For the stable distribution (lenny), this problem has been fixed in version 1.3.8-1+lenny6 of cups.
For the testing distribution (squeeze), this problem will be fixed soon.
For the unstable distribution (sid), this problem will be fixed soon.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Debian (oldstable)
Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7.orig.tar.gz Size/MD5 checksum: 4214272 c9ba33356e5bb93efbcf77b6e142e498 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8.dsc Size/MD5 checksum: 1094 42b2e4d0d1709d31270cbd0361ded3f4 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8.diff.gz Size/MD5 checksum: 109744 c73260161da939be7517c6ff0c5493cb
Architecture independent packages:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-common_1.2.7-4+etch8_all.deb Size/MD5 checksum: 921366 4cec0d4b82b768bd42c801e87831eec9 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.2.7-4+etch8_all.deb Size/MD5 checksum: 46424 bc032e7d1c4520843b540d3bb238d3a3
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_alpha.deb Size/MD5 checksum: 72856 a2c626b3f8dd8e43cecc395c5cf9ef03 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_alpha.deb Size/MD5 checksum: 1614886 8286658ca407d05ecc87ea4cd2dc870a http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_alpha.deb Size/MD5 checksum: 183730 f2c644de893bf0ca28868cfecefca04d http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_alpha.deb Size/MD5 checksum: 85916 7233e6ec6bb857653d2829cd80012d41 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_alpha.deb Size/MD5 checksum: 1093518 e6544fc0edd973d09a1e00652991845b http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_alpha.deb Size/MD5 checksum: 96030 23aca27ae72c081612fb247cfd9e33da http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_alpha.deb Size/MD5 checksum: 39332 a931e92b73c1004f4c8ed110c01ac728 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_alpha.deb Size/MD5 checksum: 175552 8bb48e7fdb170d74a14e65aecee3b230
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_amd64.deb Size/MD5 checksum: 1087540 1e71685c6620845318d49cf1fcf5feb0 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_amd64.deb Size/MD5 checksum: 87128 281a245270d6c2dcd7f0e1a6fc7d0b12 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_amd64.deb Size/MD5 checksum: 37572 c0491559f8465d610a0577cc23f00de5 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_amd64.deb Size/MD5 checksum: 162892 42d1cf5ceaa5ed7a95f16b869e6df97f http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_amd64.deb Size/MD5 checksum: 80862 511e522206e17f759cd7c56e934f08bd http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_amd64.deb Size/MD5 checksum: 1572040 e2582ab015e6e3a3858b713d6f159a34 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_amd64.deb Size/MD5 checksum: 53056 d4c82327123ddc2c0e48c804634603ae http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_amd64.deb Size/MD5 checksum: 142418 d9314cb33230b9c6dbe571671b14adda
arm architecture (ARM)
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_arm.deb Size/MD5 checksum: 1023048 8b559f55ae312c59e22a113fd6928c5f http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_arm.deb Size/MD5 checksum: 36758 cb2e80f86795f10af3fc100aa4506def http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_arm.deb Size/MD5 checksum: 1567912 776f4974949a31b3facd38b302b8097a http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_arm.deb Size/MD5 checksum: 78698 6122e3902076dd2c3247dd4b5a56a660 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_arm.deb Size/MD5 checksum: 48958 92730848f69e8540412fdf8bdfb96c1f http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_arm.deb Size/MD5 checksum: 85496 230c5b107dff69eca6f8d6241277a95f http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_arm.deb Size/MD5 checksum: 154962 8803b8b5ac7a11e3a2cf5a40f389d049 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_arm.deb Size/MD5 checksum: 131674 22e1a6767fc65ac920a5ce245743f9fd
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_hppa.deb Size/MD5 checksum: 154688 26ee139a8daabd621479d73ac2d04a16 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_hppa.deb Size/MD5 checksum: 1628398 beed29d0d6a15e33a83206acf3380cce http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_hppa.deb Size/MD5 checksum: 57246 07d89a1799a8b8daf3fb13f8c0b155d3 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_hppa.deb Size/MD5 checksum: 86802 f4e4a831a178e7e9df1f66a3af3633fb http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_hppa.deb Size/MD5 checksum: 172252 78031fa93b94ba44187e0986e82d6201 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_hppa.deb Size/MD5 checksum: 40370 b203925426b9411027184af8af2f73d6 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_hppa.deb Size/MD5 checksum: 1037196 85cd25d326e4535a9a18921e1016788d http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_hppa.deb Size/MD5 checksum: 91586 1ef7a9dd2be035a8504bd124e1da385d
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_i386.deb Size/MD5 checksum: 137728 7f9d176b0cb1e5976ea06e58526a60f4 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_i386.deb Size/MD5 checksum: 87336 3b3b4ffad78f35ffc5e05941bdfc15bd http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_i386.deb Size/MD5 checksum: 37416 3513b7cef1c51a35efd9ffd3c294e14d http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_i386.deb Size/MD5 checksum: 1000830 28dedcb611ed0538308122b860ba58c8 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_i386.deb Size/MD5 checksum: 53206 d0ae9184a84597d989b69fe7e25bc470 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_i386.deb Size/MD5 checksum: 1560356 5a8dc9c147a9d5c82224478f64731f0f http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_i386.deb Size/MD5 checksum: 79744 40326a8b68de9dbe6987e39fe95a13f8 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_i386.deb Size/MD5 checksum: 160956 da17f9d144495fde4e4c8bbad95560e8
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_ia64.deb Size/MD5 checksum: 106218 609f68aa16bfd657583e8be99a2ad0c1 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_ia64.deb Size/MD5 checksum: 74386 f0259501885d635d40aab9308a1bfbf3 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_ia64.deb Size/MD5 checksum: 192362 9009b4a91e64ab0a1c325bcaec97c2e0 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_ia64.deb Size/MD5 checksum: 1108908 1db7bb18903f47d5de29482709e3ff78 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_ia64.deb Size/MD5 checksum: 1771178 f104a7cc65ef288cd7758bb2175709a0 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_ia64.deb Size/MD5 checksum: 204522 8628cbc5cf2b22ed1d4eaeda2d7b4a60 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_ia64.deb Size/MD5 checksum: 46334 726f90dd146cd9d2d6ad964c0e718585 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_ia64.deb Size/MD5 checksum: 107424 c3c93da377fee4bf48f57778b305d5db
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_mips.deb Size/MD5 checksum: 1098528 5a9e021f7509cbde95ef66da819c3228 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_mips.deb Size/MD5 checksum: 150986 db510250f4f5aac631a743f04dc8054d http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_mips.deb Size/MD5 checksum: 36124 d8663fcdd8acb88018af29a3af61c9f6 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_mips.deb Size/MD5 checksum: 158310 776e9b5f14047779211e1262ae9f62d0 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_mips.deb Size/MD5 checksum: 76166 26a80a28871b162d72c2469a18ce6966 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_mips.deb Size/MD5 checksum: 87110 f71b2aa6af126f5ae434e1381126fc34 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_mips.deb Size/MD5 checksum: 1568290 ad4192ffb0d477ae964f6c3b039e52ac http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_mips.deb Size/MD5 checksum: 57678 da4e6ba9b1a61ad4bdc6a8e8d682fc61
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_mipsel.deb Size/MD5 checksum: 87254 e2917b072751a45afba30498006b71c3 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_mipsel.deb Size/MD5 checksum: 150894 09067f14c0938ef6dbeb500256dd42f9 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_mipsel.deb Size/MD5 checksum: 1553678 c4168376ca4d74744e24be76ec159067 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_mipsel.deb Size/MD5 checksum: 158842 f6d3053079e08de8e617272fd4a8489d http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_mipsel.deb Size/MD5 checksum: 1086490 e82ba4868d85ad36861a8aff82f6f72a http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_mipsel.deb Size/MD5 checksum: 36070 c67551d542db6a7b5081b8f0e1bdf30e http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_mipsel.deb Size/MD5 checksum: 57804 fa0c855349bfa38f31c82e83374ccdab http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_mipsel.deb Size/MD5 checksum: 77446 936b8d1173c259822d9e5ae3e82eb357
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_powerpc.deb Size/MD5 checksum: 41342 f5d1131ddc30cb780322237c47411177 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_powerpc.deb Size/MD5 checksum: 1147440 23944aceda9e865a4aab581509bb4058 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_powerpc.deb Size/MD5 checksum: 89404 9a0198042c3eb4ef053f720d20706c34 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_powerpc.deb Size/MD5 checksum: 163446 75275152a9b69f479d4b0c6ae8fb3fa0 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_powerpc.deb Size/MD5 checksum: 1582758 4544b9bc4aaf231fe604449311f118b9 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_powerpc.deb Size/MD5 checksum: 89574 942740b75d722b0fcbf284bc05035e48 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_powerpc.deb Size/MD5 checksum: 136242 5ef0278b80c263897d8942f9bc03631e http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_powerpc.deb Size/MD5 checksum: 51926 a35183dcb7bc3a0490b2ee1d8ed5ab3d
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_s390.deb Size/MD5 checksum: 82334 745d2f27c678f02ad011fa15f1731560 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_s390.deb Size/MD5 checksum: 1587692 d3c2245878121c7c16752f2b9949d0dc http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_s390.deb Size/MD5 checksum: 166998 64e5615906a50a2c19ee5359a521a9f6 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_s390.deb Size/MD5 checksum: 52522 199020914a0d52a771d112c6b2823de8 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_s390.deb Size/MD5 checksum: 1037546 89b9f600cc2a513678446a2a2fcb5b81 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_s390.deb Size/MD5 checksum: 88194 b376557a4f613fb65f46cbfae42050bf http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_s390.deb Size/MD5 checksum: 144934 da63d5b24df68891c2806f0f514911e6 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_s390.deb Size/MD5 checksum: 37422 3b0a8733a1ef7bf6fae8f00bb306bceb
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_sparc.deb Size/MD5 checksum: 78608 fb366ff39679d91c983deb2022ec0f0c http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_sparc.deb Size/MD5 checksum: 159716 eb0065adeacdf8a7f23098195a515e03 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_sparc.deb Size/MD5 checksum: 86066 5c0f9c078202fbf4c2f9c7cae3c89057 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_sparc.deb Size/MD5 checksum: 1578044 a94273670520f2db0fd4767ecb93cc4c http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_sparc.deb Size/MD5 checksum: 36060 b54d8ba11e9f8fd155e0b29f1609ebcd http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_sparc.deb Size/MD5 checksum: 51832 cb3bf2ee0f2d4661cd8198f8da780d00 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_sparc.deb Size/MD5 checksum: 996840 5609f09834fb8eecc031ad52bb1ba550 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_sparc.deb Size/MD5 checksum: 138744 5e701d9b2c7941e857c143e7289c3a20
Debian GNU/Linux 5.0 alias lenny
Debian (stable)
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6.diff.gz Size/MD5 checksum: 185068 01548b71a9c9f8f3cd4c4e38be162e0c http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6.dsc Size/MD5 checksum: 1837 74c7cc9607928673ef30937fa74d154c http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8.orig.tar.gz Size/MD5 checksum: 4796827 10efe9825c1a1dcd325be47a6cc21faf
Architecture independent packages:
http://security.debian.org/pool/updates/main/c/cups/cupsys_1.3.8-1+lenny6_all.deb Size/MD5 checksum: 52146 7e655df3208e7b1c14e963e62d2a1f9e http://security.debian.org/pool/updates/main/c/cups/libcupsys2-dev_1.3.8-1+lenny6_all.deb Size/MD5 checksum: 52174 ca30676d4f14b19d69f07948ec920645 http://security.debian.org/pool/updates/main/c/cups/cupsys-client_1.3.8-1+lenny6_all.deb Size/MD5 checksum: 52172 0745ebb9d35b06b2baed0946c9c4cdf4 http://security.debian.org/pool/updates/main/c/cups/cupsys-dbg_1.3.8-1+lenny6_all.deb Size/MD5 checksum: 52162 39dda2a8979e6d53d369a850a7287f98 http://security.debian.org/pool/updates/main/c/cups/cupsys-bsd_1.3.8-1+lenny6_all.deb Size/MD5 checksum: 52162 185cdcccb15621495bb4dd922824fb27 http://security.debian.org/pool/updates/main/c/cups/cupsys-common_1.3.8-1+lenny6_all.deb Size/MD5 checksum: 52162 7cfc925b6070373cb03f50e28ffcb5eb http://security.debian.org/pool/updates/main/c/cups/cups-common_1.3.8-1+lenny6_all.deb Size/MD5 checksum: 1180808 ab548a8679a470d91055cb14a524f019 http://security.debian.org/pool/updates/main/c/cups/libcupsys2_1.3.8-1+lenny6_all.deb Size/MD5 checksum: 52166 808680daaacf24e6969a46b5821c05b4
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_alpha.deb Size/MD5 checksum: 37990 1d176c775ae611d5de6fc28debeac312 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_alpha.deb Size/MD5 checksum: 108462 bee5be572e1c162c31a2f2cb6fccd95b http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_alpha.deb Size/MD5 checksum: 118450 c6848af4b97d419426046f53c0a10c8b http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_alpha.deb Size/MD5 checksum: 445916 a291be3dfa900c17126ce9796d71db2a http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_alpha.deb Size/MD5 checksum: 2099172 fabc17ee844d661b518a4c35321c5128 http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_alpha.deb Size/MD5 checksum: 1142836 46addc9aade19f27e42b443768023f94 http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_alpha.deb Size/MD5 checksum: 179128 0c7440b785436020854b72114e9e7686 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_alpha.deb Size/MD5 checksum: 81496 5235f6c116886ee493467ff1e52dff9f
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_amd64.deb Size/MD5 checksum: 168874 34599b5781a04df793603da238d30224 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_amd64.deb Size/MD5 checksum: 61012 fcd44c54190e1f2212335b0f971b2241 http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_amd64.deb Size/MD5 checksum: 1197270 584dbf166833f9f50a43137f1e2c04f7 http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_amd64.deb Size/MD5 checksum: 2070558 64782a03e7391d3b983fe918b6d416a6 http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_amd64.deb Size/MD5 checksum: 116780 317905cae4f2ba4acbdb62cc46b87e2a http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_amd64.deb Size/MD5 checksum: 401290 bdd244d1e6559d959eb803f8bd6abbf2 http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_amd64.deb Size/MD5 checksum: 37236 b3642bfa15ff0fe3c6d983e031275da6 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_amd64.deb Size/MD5 checksum: 99702 17dbaea17495777f8ba8a2996acc3725
arm architecture (ARM)
http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_arm.deb Size/MD5 checksum: 387466 6ac7763fc0ade8a3703104cdd3c3357a http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_arm.deb Size/MD5 checksum: 97190 e274997fb4e49c281c21549b1120efb2 http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_arm.deb Size/MD5 checksum: 113164 eaa19c4d0964cd38613ab2c58f07ce26 http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_arm.deb Size/MD5 checksum: 2059026 ee1367a147b8c07bae9c87ccc87c4998 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_arm.deb Size/MD5 checksum: 55342 c57db0444dc9193f0ab35e1a934400ec http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_arm.deb Size/MD5 checksum: 155270 5f0300fb74cb89f6b9b7bb45537f4aec http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_arm.deb Size/MD5 checksum: 1123418 df0367cba01ba9919f409b022dbe7c1b http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_arm.deb Size/MD5 checksum: 36484 7294561d854c324dc268c8fb0d616a2a
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_armel.deb Size/MD5 checksum: 1128236 5fb35a72133c870e444fe0b1250db6b2 http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_armel.deb Size/MD5 checksum: 38752 777da1a892c9d354f5e1ae2575b97d47 http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_armel.deb Size/MD5 checksum: 2075760 a850581323f50e10ded793a321763a39 http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_armel.deb Size/MD5 checksum: 387318 64dc6d3b023d3de8a9ad99c244555008 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_armel.deb Size/MD5 checksum: 98356 96861930db8e85257fa250312839d177 http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_armel.deb Size/MD5 checksum: 119314 7a4acbab9f1600e266780b8e4edc8161 http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_armel.deb Size/MD5 checksum: 156808 a67d3ee08ed7bbcee2d90e45b4c5d9fc http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_armel.deb Size/MD5 checksum: 54730 26bc079114200f249ee55182577d978b
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_hppa.deb Size/MD5 checksum: 102958 61cca5c9fe91de9823fe3b141df6cbfd http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_hppa.deb Size/MD5 checksum: 2118150 9a34c8fcfda89744ff1ed5cb57fdeae1 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_hppa.deb Size/MD5 checksum: 63136 dcc115ea567651075e3b7fbf73477f2c http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_hppa.deb Size/MD5 checksum: 406484 36b77c3f6c05df1f44b9a971b2fd3bc8 http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_hppa.deb Size/MD5 checksum: 121714 30743045e4927713923ab1f3bb9e6360 http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_hppa.deb Size/MD5 checksum: 1141670 a1d27d8aec34d3e1cefd8af9d680fdce http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_hppa.deb Size/MD5 checksum: 172628 bc5c1f4a039c3fb8dbfdd0dc36aa2f56 http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_hppa.deb Size/MD5 checksum: 39974 b00448f41ec531188e029bc7173f5271
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_i386.deb Size/MD5 checksum: 99256 289e9977f36773c117b6fcc6580b464f http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_i386.deb Size/MD5 checksum: 1096046 28adf6b61f8bff81e19ee5b7fc464aac http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_i386.deb Size/MD5 checksum: 60422 d4646115f417b7d56b1665283e914b42 http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_i386.deb Size/MD5 checksum: 115956 4db026d788ab7bcb923847491f46b8ca http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_i386.deb Size/MD5 checksum: 2051272 6b1ce4707c65c46af6ae766ce9b50e99 http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_i386.deb Size/MD5 checksum: 165348 ffd04ab3b875fef36b26fe3dd1106996 http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_i386.deb Size/MD5 checksum: 393998 080d022507d07a4713b3f95acb7c22f6 http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_i386.deb Size/MD5 checksum: 38022 7990b6a4a8d217fe07e7e1bd0f9108ff
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_ia64.deb Size/MD5 checksum: 2281420 2adc4c08d3bc24c8d70acac31ca8421a http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_ia64.deb Size/MD5 checksum: 123434 e3c1cbbd801a0ddd985e3b27c021b9d8 http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_ia64.deb Size/MD5 checksum: 209034 5bfbe9000e4f1cafdbc66a6a94c20e7b http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_ia64.deb Size/MD5 checksum: 1149350 7f6b259e7f4ecc70accf51236efb3a5a http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_ia64.deb Size/MD5 checksum: 41278 1cee7bf398c2e2c7e4189f005cbb3444 http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_ia64.deb Size/MD5 checksum: 139124 8ff9597b3e2cd534614a66531a5db361 http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_ia64.deb Size/MD5 checksum: 447412 b59175ffef15d9b2e618b85ce6f8cff2 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_ia64.deb Size/MD5 checksum: 86018 e5badf6982128286853fc360fc77a4d3
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_mips.deb Size/MD5 checksum: 157842 c3652835b110a94fc5a5f9d20230e443 http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_mips.deb Size/MD5 checksum: 2047282 ce608c3fa6d89e7d7ff3e313f88fbef2 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_mips.deb Size/MD5 checksum: 98662 ddbba9bea120f9b7740adc8ceb45c3dc http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_mips.deb Size/MD5 checksum: 108508 0a5b6ba27061cfa40e45cfc514d3ba0d http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_mips.deb Size/MD5 checksum: 36010 a786245e49b8cabcaad41a5e92a5c884 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_mips.deb Size/MD5 checksum: 65290 155e5959fac035fc8307800061913d35 http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_mips.deb Size/MD5 checksum: 1170866 11910e0f1ccbb2f3ba151cbfe8186696 http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_mips.deb Size/MD5 checksum: 405510 4f848ff0dd8f2b08f3fa3bb220a6f75c
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_mipsel.deb Size/MD5 checksum: 158274 8c3b143ee488c17cf00cf7599bee331c http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_mipsel.deb Size/MD5 checksum: 98792 74a91f31a602f6f2a0c04b4e72723b86 http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_mipsel.deb Size/MD5 checksum: 1156060 f3be7e74bd904dfdecc086bc6ee16bf5 http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_mipsel.deb Size/MD5 checksum: 403142 42cf44870e91355bb7a465dce52605ae http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_mipsel.deb Size/MD5 checksum: 36142 daa9ed0b87002a002bece0890b1a6e12 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_mipsel.deb Size/MD5 checksum: 65216 a1c8b686980e932f19a789430a4eafaa http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_mipsel.deb Size/MD5 checksum: 2028136 a67cf50db9734a8175936ff5e2d45d5d http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_mipsel.deb Size/MD5 checksum: 109968 23ff5d8a36aecd545c5cf210bc3873d5
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_powerpc.deb Size/MD5 checksum: 394114 5309447c955f4decbe93f50802ed1805 http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_powerpc.deb Size/MD5 checksum: 1188662 f8438353bab0a00502a1687042c54961 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_powerpc.deb Size/MD5 checksum: 61144 ac80e1cd5cc0661c10693d360e32c11d http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_powerpc.deb Size/MD5 checksum: 174232 5938321743bda64571c6d0797f84dca1 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_powerpc.deb Size/MD5 checksum: 104730 d5f60c53825c532dca34cb21f1c1d2fb http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_powerpc.deb Size/MD5 checksum: 44212 d0b547b8cf87254ce65874df057468db http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_powerpc.deb Size/MD5 checksum: 136102 34f3fbb1bf5519277c20944b3d118a6c http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_powerpc.deb Size/MD5 checksum: 2122006 f0e6902972831c2490b6f6bcbecd1ba0
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_s390.deb Size/MD5 checksum: 101502 e48e528e2b3ee8140dcce180aae0feb8 http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_s390.deb Size/MD5 checksum: 37818 7f26d32ff01aa1088e424a16439d0990 http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_s390.deb Size/MD5 checksum: 171544 131841fd12d9331c312f8a28718fe8a1 http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_s390.deb Size/MD5 checksum: 399662 f80688352e705e1293d64bb211dcd568 http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_s390.deb Size/MD5 checksum: 2090700 7d406321bb349547bdbe43123fb770f3 http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_s390.deb Size/MD5 checksum: 118588 64d6969a96a76de52a7296c745116a48 http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_s390.deb Size/MD5 checksum: 1188192 365ee760b0b9b8dd869dd11f1f4c42f9 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_s390.deb Size/MD5 checksum: 60716 634f2ba3cc0eb22c59252f15a1582770
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_sparc.deb Size/MD5 checksum: 390982 1235ace473b594360267daef5663c1b3 http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_sparc.deb Size/MD5 checksum: 116666 3c08364f33b2594c4f8be8c0bfce7333 http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_sparc.deb Size/MD5 checksum: 1051168 056faed5a5baf927d91b21b4fe624812 http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_sparc.deb Size/MD5 checksum: 38374 6401223175cfcf9082f3fac43a4f9d42 http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_sparc.deb Size/MD5 checksum: 2069062 4041871842ca0f29408c95c39f9cbb68 http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_sparc.deb Size/MD5 checksum: 160772 6a682010c72d5d78f4a6efcfb3ed5955 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_sparc.deb Size/MD5 checksum: 57762 478e92cd02d8acb20a600d4ca61aba39 http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_sparc.deb Size/MD5 checksum: 96996 37446d6e2f9dbf94122db96d1df00b9f
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkolko8ACgkQHYflSXNkfP+rjwCfWDGEVO8HeUkO9sF09pz0Nvwn 4GMAn3rgCfJK2rFC5dZyvIzTiyo6CiUb =6yYH -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200906-0617", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "debian", "version": "5.0" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "debian", "version": "4.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "8.10" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "6.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "9.04" }, { "model": "mac os x server", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "10.0.0" }, { "model": "mac os x server", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "10.5.8" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "10.3" }, { "model": "mac os x", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "10.4.11" }, { "model": "linux enterprise", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "9.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "8.04" }, { "model": "mac os x", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "10.5.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "6.06" }, { "model": "mac os x server", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "10.4.11" }, { "model": "mac os x", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "10.0.0" }, { "model": "mac os x", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "10.5.8" }, { "model": "linux enterprise", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "10.0" }, { "model": "mac os x server", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "10.5.0" }, { "model": "cups", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "1.3.10" }, { "model": "apple mac os x server", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "cups", "scope": null, "trust": 0.8, "vendor": "cups", "version": null }, { "model": "red hat enterprise linux", "scope": null, "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "turbolinux appliance server", "scope": null, "trust": 0.8, "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9", "version": null }, { "model": "apple mac os x", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "red hat enterprise linux eus", "scope": null, "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "rhel desktop workstation", "scope": "eq", "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": "5 (client)" }, { "model": "red hat enterprise linux desktop", "scope": null, "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "turbolinux client", "scope": null, "trust": 0.8, "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9", "version": null }, { "model": "turbolinux server", "scope": null, "trust": 0.8, "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9", "version": null }, { "model": "asianux server", "scope": null, "trust": 0.8, "vendor": "\u30b5\u30a4\u30d0\u30fc\u30c8\u30e9\u30b9\u30c8\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cups", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.3.6" }, { "model": "cups", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.3.8" }, { "model": "cups", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.3.3" }, { "model": "cups", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.3.7" }, { "model": "cups", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.3" }, { "model": "cups", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.3.5" }, { "model": "cups", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.3.9" }, { "model": "cups", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.3.4" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux enterprise server sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "linux enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise server sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise desktop sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise desktop sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10.3" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux desktop version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "hat enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.3.9" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.3.8" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.3.7" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.3.6" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.3.5" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.3.3" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.3.2" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.2.12" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.2.10" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.2.9" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.2.8" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.2.4" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.2.2" }, { "model": "software products cups rc1", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.23" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.23" }, { "model": "software products cups rc1", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.22" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.22" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.21" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.20" }, { "model": "software products cups rc5", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.19" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.19" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.18" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.17" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.16" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.15" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.14" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.13" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.12" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.10" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.7" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.6" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.4-5" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.4-3" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.4-2" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.4" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.1" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.0.4-8" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.0.4" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "intuity audix r5", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "intuity audix lx sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "intuity audix lx sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "intuity audix lx", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "intuity audix lx", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.9" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "software products cups", "scope": "ne", "trust": 0.3, "vendor": "easy", "version": "1.3.10" } ], "sources": [ { "db": "BID", "id": "35169" }, { "db": "JVNDB", "id": "JVNDB-2009-001733" }, { "db": "CNNVD", "id": "CNNVD-200906-120" }, { "db": "NVD", "id": "CVE-2009-0949" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.3.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.5.8", "versionStartIncluding": "10.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.5.8", "versionStartIncluding": "10.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.4.11", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.4.11", "versionStartIncluding": "10.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2009-0949" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Anibal Sacco", "sources": [ { "db": "CNNVD", "id": "CNNVD-200906-120" } ], "trust": 0.6 }, "cve": "CVE-2009-0949", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2009-0949", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-38395", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2009-0949", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2009-0949", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200906-120", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-38395", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-38395" }, { "db": "JVNDB", "id": "JVNDB-2009-001733" }, { "db": "CNNVD", "id": "CNNVD-200906-120" }, { "db": "NVD", "id": "CVE-2009-0949" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags. Common Unix Printing System(CUPS)\u662f\u4e00\u6b3e\u901a\u7528Unix\u6253\u5370\u7cfb\u7edf\uff0c\u662fUnix\u73af\u5883\u4e0b\u7684\u8de8\u5e73\u53f0\u6253\u5370\u89e3\u51b3\u65b9\u6848\uff0c\u57fa\u4e8eInternet\u6253\u5370\u534f\u8bae\uff0c\u63d0\u4f9b\u5927\u591a\u6570PostScript\u548craster\u6253\u5370\u673a\u670d\u52a1 . \n\u5728\u5904\u7406\u5305\u542b\u6709\u4e24\u4e2aIPP_TAG_UNSUPPORTED\u6807\u7b7e\u7684\u7279\u8d28IPP\u65f6\uff0cCUPS\u7684cups/ipp.c\u6587\u4ef6\u4e2d\u7684ippReadIO()\u51fd\u6570\u6ca1\u6709\u6b63\u786e\u5730\u521d\u59cb\u5316ipp\u7ed3\u6784\uff0c\u8fd9\u53ef\u80fd\u5bfc\u81f4\u53d7\u5f71\u54cd\u7684\u5e94\u7528\u5d29\u6e83 . \ncups/ipp.c\u6587\u4ef6\u4e2d\u7684ippReadIO()\u51fd\u6570\u8d1f\u8d23\u521d\u59cb\u5316\u8868\u793a\u5f53\u524dIPP\u8bf7\u6c42\u4e2d\u4e0d\u540c\u6807\u7b7e\u7684ipp\u7ed3\u6784\uff1a\n\n/-----------\n1016 ipp_state_t /* O - Current state */\n1017 ippReadIO(void*src, /* I - Data source */\n1018 ipp_iocb_tcb, /* I - Read callback function */\n1019 int blocking, /* I - Use blocking IO? */\n1020 ipp_t *parent,/* I - Parent request, if any */\n1021 ipp_t *ipp) /* I - IPP data */\n1022 {\n1023 int n;/* Length of data */\n1024 unsignedchar buffer[IPP_MAX_LENGTH + 1],\n1025 /* Data buffer */\n1026 string[IPP_MAX_NAME],\n1027 /* Small string buffer */\n1028*bufptr; /* Pointer into buffer */\n1029ipp_attribute_t*attr; /* Current attribute */\n1030ipp_tag_t tag; /* Current tag */\n1031ipp_tag_t value_tag; /* Current value tag */\n1032ipp_value_t *value;/* Current value */\n1035DEBUG_printf((\\\"ippReadIO(\\\\%p, \\\\%p, \\\\%d, \\\\%p, \\\\%p)\uff3cn\\\", src, cb, blocking,\n1036parent, ipp));\n1037DEBUG_printf((\\\"ippReadIO\uff1a ipp-\uff1estate=\\\\%d\uff3cn\\\", ipp-\uff1estate));\n1039if (src == NULL || ipp == NULL)\n1040return (IPP_ERROR);\n1041\n1042switch (ipp-\uff1estate)\n1043{\n1044case IPP_IDLE \uff1a\n1045ipp-\uff1estate ++; /* Avoid common problem... */\n1046\n1047case IPP_HEADER \uff1a\n1048if (parent == NULL)\n- -----------/\n\n\u5728\u4e0a\u9762\u7684\u4ee3\u7801\u4e2d\uff0c\u901a\u8fc7\u51e0\u4e2a\u4e0d\u540c\u7684\u6807\u7b7e\u5c5e\u6027\u5bf9\u62a5\u6587\u8fdb\u884c\u8ba1\u6570\u3002\u5982\u679c\u6240\u53d1\u9001\u7684IPP\u62a5\u6587\u6807\u7b7e\u5c5e\u6027\u4f4e\u4e8e0x10\uff0cCUPS\u5c31\u4f1a\u8ba4\u4e3a\u662fIPP_TAG_UNSUPPORTED\u6807\u7b7e\uff1a\n\n/-----------\nelse if (tag \uff1c IPP_TAG_UNSUPPORTED_VALUE)\n{\n/*\n* Group tag...Set the current group and continue... \n*/\nif (ipp-\uff1ecurtag == tag)\nipp-\uff1eprev = ippAddSeparator(ipp);\nelse if (ipp-\uff1ecurrent)\nipp-\uff1eprev = ipp-\uff1ecurrent;\nipp-\uff1ecurtag= tag;\nipp-\uff1ecurrent = NULL;\nDEBUG_printf((\\\"ippReadIO\uff1a group tag = \\\\%x, ipp-\uff1eprev=\\\\%p\uff3cn\\\", tag,\nipp-\uff1eprev));\ncontinue;\n}\n- -----------/\n\n\u7531\u4e8eCUPS\u5904\u7406\u8fd9\u7c7b\u6807\u7b7e\u7684\u65b9\u5f0f\uff0c\u5982\u679c\u62a5\u6587\u4e2d\u5305\u542b\u6709\u4e24\u4e2a\u8fde\u7eed\u7684IPP_TAG_UNSUPPORTED\uff0c\u5c31\u4f1a\u5c06IPP\u7ed3\u6784\u7684\u6700\u540e\u4e00\u4e2a\u8282\u70b9\u521d\u59cb\u5316\u4e3aNULL\uff0c\u8fd9\u4f1a\u5728cupsdProcessIPPRequest\u51fd\u6570\u8bd5\u56fe\u8bfb\u53d6attr\u7ed3\u6784\u7684name\u5b57\u6bb5\u65f6\u5bfc\u81f4\u5d29\u6e83. \n\n/-----------\n/*\n* \\\u0027\\\u0027cupsdProcessIPPRequest()\\\u0027\\\u0027 - Process an incoming IPP request. \n*/\nint /* O - 1 on success, 0 on\nfailure */\ncupsdProcessIPPRequest( cupsd_client_t *con)/* I - Client connection */\n... \nif (!attr)\n{\n/*\n* Then make sure that the first three attributes are\uff1a\n*\n* attributes-charset\n* attributes-natural-language\n* printer-uri/job-uri\n*/\n\nattr = con-\uff1erequest-\uff1eattrs;\nif (attr \uff06\uff06 !strcmp(attr-\uff1ename, \\\"attributes-charset\\\") \uff06\uff06\n(attr-\uff1evalue_tag \uff06 IPP_TAG_MASK) == IPP_TAG_CHARSET)\ncharset = attr;\nelse\ncharset = NULL;\n... \n- -----------/. CUPS is prone to a denial-of-service vulnerability because of a NULL-pointer dereference that occurs when processing two consecutive IPP_TAG_UNSUPPORTED tags in specially crafted IPP (Internet Printing Protocal) packets. \nAn attacker can exploit this issue to crash the affected application, denying service to legitimate users. It is based on the Internet Printing Protocol and provides most PostScript and raster printer services. The ippReadIO() function in CUPS\u0027s cups/ipp.c file did not properly initialize the ipp structure when processing a idiosyncratic IPP that contained two IPP_TAG_UNSUPPORTED tags, which could crash the affected application. ===========================================================\nUbuntu Security Notice USN-780-1 June 03, 2009\ncups, cupsys vulnerability\nCVE-2009-0949\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 8.04 LTS\nUbuntu 8.10\nUbuntu 9.04\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n cupsys 1.2.2-0ubuntu0.6.06.14\n\nUbuntu 8.04 LTS:\n cupsys 1.3.7-1ubuntu3.5\n\nUbuntu 8.10:\n cups 1.3.9-2ubuntu9.2\n\nUbuntu 9.04:\n cups 1.3.9-17ubuntu3.1\n\nIn general, a standard system upgrade is sufficient to effect the\nnecessary changes. \n\nDetails follow:\n\nAnibal Sacco discovered that CUPS did not properly handle certain network\noperations. \n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14.diff.gz\n Size/MD5: 101447 1edf4eb6127965001092ac72fc5743ea\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14.dsc\n Size/MD5: 1060 4843503dffb5c5268a64499cb2cf279e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2.orig.tar.gz\n Size/MD5: 4070384 2c99b8aa4c8dc25c8a84f9c06aa52e3e\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-gnutls10_1.2.2-0ubuntu0.6.06.14_all.deb\n Size/MD5: 998 ee02e19aab490d9d97b6d3eb0f0808e4\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.14_amd64.deb\n Size/MD5: 36236 8f3c604623813d67800c2f06686ccd1b\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.14_amd64.deb\n Size/MD5: 81894 166216227002808778e9a01798409a37\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14_amd64.deb\n Size/MD5: 2287028 141ace9ca050db86cdef9b44e620c13b\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.14_amd64.deb\n Size/MD5: 6094 f338b2ae622333497e2cda10f26590e9\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.14_amd64.deb\n Size/MD5: 77648 40846208a23006cab7c7bd52813a6343\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.14_amd64.deb\n Size/MD5: 25756 5b703a78f78465181f785715ef7036cc\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.14_amd64.deb\n Size/MD5: 130344 6c9d54d7f6c8069d8d69652bf6dbddd7\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.14_i386.deb\n Size/MD5: 34762 08037502d74a512a07b184c2999d32ad\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.14_i386.deb\n Size/MD5: 77992 260347aa2b7f4ec59fcaa1d29a16e0c3\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14_i386.deb\n Size/MD5: 2254260 49e00eabc519426ee5413864c4bdb251\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.14_i386.deb\n Size/MD5: 6092 0a515dd0fdd48eb70da0b5bfe3019f08\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.14_i386.deb\n Size/MD5: 76752 7ee453f379433e22b9451e6282669797\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.14_i386.deb\n Size/MD5: 25740 28af462a2e8f13620bb1b70cef1cd08e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.14_i386.deb\n Size/MD5: 122538 200a588a83e668f621ca41bc41a13413\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.14_powerpc.deb\n Size/MD5: 40462 3937e3b6cb8f6cda2f1e450518a4e136\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.14_powerpc.deb\n Size/MD5: 89516 bf845949727422d0ae4d550966d34c72\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14_powerpc.deb\n Size/MD5: 2301634 8bf6a7e2fcff62817459186c189673d1\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.14_powerpc.deb\n Size/MD5: 6094 cb2ff11f6c55d69b99f39e64ad399774\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.14_powerpc.deb\n Size/MD5: 79292 b137122dde7459d5653e024b4d3b5852\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.14_powerpc.deb\n Size/MD5: 25744 7765abc3cea993a82a638458202892e5\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.14_powerpc.deb\n Size/MD5: 128304 69634210a2fa2a8af2383a12b657a568\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.14_sparc.deb\n Size/MD5: 35390 f4a5a9207d6494c05a7820cdbf2cadf9\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.14_sparc.deb\n Size/MD5: 78720 423336f4bf4be9292f49f31ab6cac3dc\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14_sparc.deb\n Size/MD5: 2287900 4833fae9ab11ecd3721faef405ad8167\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.14_sparc.deb\n Size/MD5: 6094 ebae0d6eb86d9e3f4fff77c860f1693c\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.14_sparc.deb\n Size/MD5: 76568 7d1814766e366021fc136cb6577880b9\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.14_sparc.deb\n Size/MD5: 25746 a4eacdcf7d078a8200660cf0bb37c694\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.14_sparc.deb\n Size/MD5: 124034 6fd4c6c86596379e32fc228ed15cf4dc\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5.diff.gz\n Size/MD5: 135129 091bf3e7ac7e1a1f074dc15d08c2c4d5\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5.dsc\n Size/MD5: 1441 9cf7f2d9b00a22af8e8ccdfbe234fd8e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7.orig.tar.gz\n Size/MD5: 4700333 383e556d9841475847da6076c88da467\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.3.7-1ubuntu3.5_all.deb\n Size/MD5: 1144240 9c3908b1639d493bcc580368adbfa3a3\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.5_amd64.deb\n Size/MD5: 37530 c252102dbd39005b010fff629e4daf2c\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.5_amd64.deb\n Size/MD5: 89980 2d95b8b2a44cfa62603335d6211f5fd1\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5_amd64.deb\n Size/MD5: 1880552 e94141a55ae34eb9ac5be1b941268f5b\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.5_amd64.deb\n Size/MD5: 60804 9e8d5476cccb6ea9ac0d0eaf1db9c615\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.5_amd64.deb\n Size/MD5: 50216 5de274a35fa3cbea87c9245b179364b5\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.5_amd64.deb\n Size/MD5: 344920 6a966e90749cbaf815c511717b84abaa\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.5_amd64.deb\n Size/MD5: 178092 3d4bda40ecf7c2091cc173b79658d6c9\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.5_i386.deb\n Size/MD5: 36952 2c6053368cf2a00f66197eca444af3b5\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.5_i386.deb\n Size/MD5: 88394 0c572acada7273e30b15bcb3cc2874cb\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5_i386.deb\n Size/MD5: 1863054 68e5cbd5fd1ed11bee4fef0c4e79de7f\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.5_i386.deb\n Size/MD5: 60082 062ad31917eedc6e5003e990807d838b\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.5_i386.deb\n Size/MD5: 49852 9ac15961d63d2fd6f4ce702e688a8985\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.5_i386.deb\n Size/MD5: 339354 8b842a2c754dc36a307aa64e613fe4c7\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.5_i386.deb\n Size/MD5: 174938 58ab39cc15878a158487fb858af9958d\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.5_lpia.deb\n Size/MD5: 36658 536346a17e6b5035307bdf1ce04b3799\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.5_lpia.deb\n Size/MD5: 88744 2141679378e4e3700c78c09ec936e1da\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5_lpia.deb\n Size/MD5: 1865310 094ffb6f741440a18fca28d50b29ead0\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.5_lpia.deb\n Size/MD5: 60488 8681c7ebbe8e781fb7b3348b00da9de9\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.5_lpia.deb\n Size/MD5: 50808 dce50fc21c292b77ff3d0f21946cf23e\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.5_lpia.deb\n Size/MD5: 337014 84ca26401f9ae81f3d9f535f0361dd0c\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.5_lpia.deb\n Size/MD5: 173878 1f3e4888d7cf574b1c62aa092c852b8a\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.5_powerpc.deb\n Size/MD5: 46918 6e9a925312380561f2299f66cb134357\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.5_powerpc.deb\n Size/MD5: 110820 b7b8c667cf96cfe0d60c1f2d1ba96628\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5_powerpc.deb\n Size/MD5: 1949102 2d78cac8f6b3c758ac337c791de433a3\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.5_powerpc.deb\n Size/MD5: 59926 0c7f18be806b6467c39dd1955c6e4685\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.5_powerpc.deb\n Size/MD5: 54920 9403a69f365361e033707d5914a92f52\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.5_powerpc.deb\n Size/MD5: 341668 0ee868915ef0bd3e177244f931ec7b5d\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.5_powerpc.deb\n Size/MD5: 183836 e45a7d338ce136c48abf6c5cce3b6f6b\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.5_sparc.deb\n Size/MD5: 38028 e556e3eecc385e35b5c790046f91cec9\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.5_sparc.deb\n Size/MD5: 91034 84e2052f3fd9e57363b13779fe3fb30f\n http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5_sparc.deb\n Size/MD5: 1897852 30481f2e4dff5ba7e8d465d0771360c8\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.5_sparc.deb\n Size/MD5: 57826 72589c6d350921d2ac7d5a4207c5b78a\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.5_sparc.deb\n Size/MD5: 48216 59e887dda48b748158c7083d50fb6405\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.5_sparc.deb\n Size/MD5: 341372 0976433618733b76b21104715594256e\n http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.5_sparc.deb\n Size/MD5: 173768 853ddf9a445d28cdf2740957676b50cd\n\nUpdated packages for Ubuntu 8.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu9.2.diff.gz\n Size/MD5: 329287 0f1eabafd9f35ce1c7103f131976af91\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu9.2.dsc\n Size/MD5: 2043 5c406df0ddf6c7f849147bbccb4350bb\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9.orig.tar.gz\n Size/MD5: 4809771 e6f2d90491ed050e5ff2104b617b88ea\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-common_1.3.9-2ubuntu9.2_all.deb\n Size/MD5: 1162826 78ce799e56015d07969aea1b1e5750fe\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-bsd_1.3.9-2ubuntu9.2_all.deb\n Size/MD5: 58238 c04c758e79b5d28dec48637c8c73b549\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-client_1.3.9-2ubuntu9.2_all.deb\n Size/MD5: 58252 588dfe9e578fb1a17daf2faa5fab8774\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-dbg_1.3.9-2ubuntu9.2_all.deb\n Size/MD5: 58244 0fa4c07b2e66a7d0c106071d283d7edc\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys_1.3.9-2ubuntu9.2_all.deb\n Size/MD5: 58236 f163f465b79566c194364d14ebb49608\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsys2-dev_1.3.9-2ubuntu9.2_all.deb\n Size/MD5: 58252 afd476b79ec34e694d19f360a2cbc64c\n http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys-common_1.3.9-2ubuntu9.2_all.deb\n Size/MD5: 4526 bd17a9f9600e53f3c5ce3b18a2cae590\n http://security.ubuntu.com/ubuntu/pool/universe/c/cups/libcupsys2_1.3.9-2ubuntu9.2_all.deb\n Size/MD5: 58240 b1702f69d74e496859096eb6101e5139\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu9.2_amd64.deb\n Size/MD5: 37300 2e18f255477200b6320afa7e6903508f\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-2ubuntu9.2_amd64.deb\n Size/MD5: 119744 9c484968a2250bd303c305df9d53943f\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu9.2_amd64.deb\n Size/MD5: 1682962 e7fa53ce69537cd609e8d88e1873e9cc\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu9.2_amd64.deb\n Size/MD5: 2172504 b4d5b2ce9603e2b36374b100dbf9ada7\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu9.2_amd64.deb\n Size/MD5: 352190 8bbf84d00818cf88c0f3d048fa425cf1\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-2ubuntu9.2_amd64.deb\n Size/MD5: 173268 01abbe7f859eef7e9e5d453792b96f76\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu9.2_amd64.deb\n Size/MD5: 61314 73a75d935ccb41f7827bfeff0bf8f9ec\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu9.2_amd64.deb\n Size/MD5: 52312 263e4265a47473eff3b416b896907103\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu9.2_i386.deb\n Size/MD5: 36226 c8d3d0df62f93d519369f37ab0d337bf\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-2ubuntu9.2_i386.deb\n Size/MD5: 115328 65483c26c3e0efe02922a59beeb0d833\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu9.2_i386.deb\n Size/MD5: 1542716 c3737d9cfb6277985baf83bf4a449150\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu9.2_i386.deb\n Size/MD5: 2139250 edef8688cd2fe57ac989b4bad50022ac\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu9.2_i386.deb\n Size/MD5: 345992 e4adcaea69f8ae947f1ca0b63af74ffd\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-2ubuntu9.2_i386.deb\n Size/MD5: 170194 fd8ab14aafda63f2f41cbd4885be0d81\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu9.2_i386.deb\n Size/MD5: 60534 5064205f7a26e8ed1a543932e6aad79e\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu9.2_i386.deb\n Size/MD5: 51718 e663a435f42d39438e5fdf1ed599c7cb\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu9.2_lpia.deb\n Size/MD5: 36014 b9a880feca8d481df4f9495cec8b8121\n http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu9.2_lpia.deb\n Size/MD5: 114512 1617fc04bc3c063dcb8bbc884050c6b2\n http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu9.2_lpia.deb\n Size/MD5: 1571962 7b061e95651696885125af95d7b08532\n http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu9.2_lpia.deb\n Size/MD5: 2135962 8695e326f9876ed3c3012becfaeed0f4\n http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu9.2_lpia.deb\n Size/MD5: 342968 9887c91b3ac9427b240317f6eb6d8bf0\n http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu9.2_lpia.deb\n Size/MD5: 168430 e13502a0fda3165d41d92f156f2ade21\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu9.2_lpia.deb\n Size/MD5: 60630 63b43b5b90c7f271d8ffc491d50c77e0\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu9.2_lpia.deb\n Size/MD5: 52386 f0ee10297823f8aa39049a1f9cff34bb\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu9.2_powerpc.deb\n Size/MD5: 43564 e3d68dd451cae339f4629e36363e27b4\n http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu9.2_powerpc.deb\n Size/MD5: 138160 8d11bd04570c0738af0b35ecef8ca018\n http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu9.2_powerpc.deb\n Size/MD5: 1663540 3f5d9437ffe6df630cde4ad4b4fbbe35\n http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu9.2_powerpc.deb\n Size/MD5: 2264222 6c49653a70198b67692c220135fe5428\n http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu9.2_powerpc.deb\n Size/MD5: 347966 72a14e0a64f503365475c436fa45ac39\n http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu9.2_powerpc.deb\n Size/MD5: 177464 2615af3dce1a5b56c001adcbab649264\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu9.2_powerpc.deb\n Size/MD5: 61256 b021d0be4915346dfc22203556c56ce4\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu9.2_powerpc.deb\n Size/MD5: 57436 a9463cb0014dba068fe6ad3dd05b7693\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu9.2_sparc.deb\n Size/MD5: 37216 b30aec0d4f3cff1d59594c1272002e93\n http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu9.2_sparc.deb\n Size/MD5: 117640 35ca75a0021841529ed85691ba0496bc\n http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu9.2_sparc.deb\n Size/MD5: 1490704 f143b16a5a811b517cc968d9e628feb9\n http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu9.2_sparc.deb\n Size/MD5: 2200938 91b1621927bd5feb83bd1dd8fa20005d\n http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu9.2_sparc.deb\n Size/MD5: 344786 c5e02a1f344ddc4e10b91b255ac869dd\n http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu9.2_sparc.deb\n Size/MD5: 166318 e6bfc6840275b954311c4544667d6193\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu9.2_sparc.deb\n Size/MD5: 57848 f4c6f5c70fd1ec7a95c322186e86c487\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu9.2_sparc.deb\n Size/MD5: 49796 52f0c961942e4a0b8e85ed3b6d4953a4\n\nUpdated packages for Ubuntu 9.04:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-17ubuntu3.1.diff.gz\n Size/MD5: 331113 386644ef646604fa3ea0f18a3440dd94\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-17ubuntu3.1.dsc\n Size/MD5: 1984 974758acb855004824caa579913a402f\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9.orig.tar.gz\n Size/MD5: 4809771 e6f2d90491ed050e5ff2104b617b88ea\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-common_1.3.9-17ubuntu3.1_all.deb\n Size/MD5: 1165116 0fea2201baecec1a63153ca024cf85b3\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-dbg_1.3.9-17ubuntu3.1_all.deb\n Size/MD5: 60220 78f1df511789d7c6fa564df73ae3737e\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsys2-dev_1.3.9-17ubuntu3.1_all.deb\n Size/MD5: 60230 dd363c3548b1d7bab16bb595ac2d8682\n http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys-bsd_1.3.9-17ubuntu3.1_all.deb\n Size/MD5: 60222 3fe72599089459e0533070ee35696c96\n http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys-client_1.3.9-17ubuntu3.1_all.deb\n Size/MD5: 60218 33922120f0f3b6d755691c6cd31a983a\n http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys-common_1.3.9-17ubuntu3.1_all.deb\n Size/MD5: 4520 4944980239da17a124a13b5eb08814af\n http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys_1.3.9-17ubuntu3.1_all.deb\n Size/MD5: 60204 578a4a096679845a551abab4687ecd07\n http://security.ubuntu.com/ubuntu/pool/universe/c/cups/libcupsys2_1.3.9-17ubuntu3.1_all.deb\n Size/MD5: 60220 404eae856385b1def832fb0474551e51\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-17ubuntu3.1_amd64.deb\n Size/MD5: 37310 824835ae3f5e791b0ced4e0bfa0094aa\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-17ubuntu3.1_amd64.deb\n Size/MD5: 119750 d3562b6435de311fdfdd3f5a433beafe\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-17ubuntu3.1_amd64.deb\n Size/MD5: 1658120 811f80a88d0fdcee20f41383b313d073\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-17ubuntu3.1_amd64.deb\n Size/MD5: 2168616 178ada0830fa6b64f1b2a28f43ba68d5\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-17ubuntu3.1_amd64.deb\n Size/MD5: 352130 b9502f3daaa52d057a815e6a11433707\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-17ubuntu3.1_amd64.deb\n Size/MD5: 177068 fedd91d5e3094e813b85c910e6f950ab\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-17ubuntu3.1_amd64.deb\n Size/MD5: 61260 68d03afa62ffd74aa517c588cd32017d\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-17ubuntu3.1_amd64.deb\n Size/MD5: 52220 715bc18c530db346e2faad81789af0a0\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-17ubuntu3.1_i386.deb\n Size/MD5: 36212 f8a3d3701b170c1637b469b1abcde7c6\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-17ubuntu3.1_i386.deb\n Size/MD5: 115324 062953a515a6c8b27c75c7539472f9f4\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-17ubuntu3.1_i386.deb\n Size/MD5: 1517622 a3c1f3ad98db97230d25ba20acfa4c11\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-17ubuntu3.1_i386.deb\n Size/MD5: 2134800 0cde4fc0fac7b7682f0a53f38caedbc4\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-17ubuntu3.1_i386.deb\n Size/MD5: 345990 2bc3076c1ad6c67c5858f62714ab4a3b\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-17ubuntu3.1_i386.deb\n Size/MD5: 173740 c44041d8784eae4ac9400a0d3b9b9138\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-17ubuntu3.1_i386.deb\n Size/MD5: 60488 c923e354bf04dbafff5339ea6d18433e\n http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-17ubuntu3.1_i386.deb\n Size/MD5: 51530 b03604b87ea464a7f97e26272582ee18\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-17ubuntu3.1_lpia.deb\n Size/MD5: 36032 2be317cc9206baaff256b4325072589a\n http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-17ubuntu3.1_lpia.deb\n Size/MD5: 114486 8c27d1961b1aa8a73f3c342ae6ae92f8\n http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-17ubuntu3.1_lpia.deb\n Size/MD5: 1546154 0d3adaac793d357587ce7cc4275fe55f\n http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-17ubuntu3.1_lpia.deb\n Size/MD5: 2132166 9ae39e3c42178dd9b384fc8bc8a13d82\n http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-17ubuntu3.1_lpia.deb\n Size/MD5: 342936 2cff2dcc4b5cd9e54046bd97f2ca1bed\n http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-17ubuntu3.1_lpia.deb\n Size/MD5: 171954 a2ea14f0324efa3d936f8a31730d0c9d\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-17ubuntu3.1_lpia.deb\n Size/MD5: 60678 4594a7764c86b427ff76b2700a294ddc\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-17ubuntu3.1_lpia.deb\n Size/MD5: 52340 86b3bb0d4279f78231d1bdd0e1dbc3fb\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-17ubuntu3.1_powerpc.deb\n Size/MD5: 43578 302e5e3849b99d0a12e2ff4f96be71d1\n http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-17ubuntu3.1_powerpc.deb\n Size/MD5: 138164 5e62e249891ed196a7eb21466205fd7b\n http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-17ubuntu3.1_powerpc.deb\n Size/MD5: 1633586 15e374d5ff627a56713f2a7ce61ef616\n http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-17ubuntu3.1_powerpc.deb\n Size/MD5: 2256002 66dd6a9c74b750671c86e90163941953\n http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-17ubuntu3.1_powerpc.deb\n Size/MD5: 347906 cb12b0143262bdbe01a6e69584947228\n http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-17ubuntu3.1_powerpc.deb\n Size/MD5: 182450 c07ea0fed64ca677713c8a9362a38467\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-17ubuntu3.1_powerpc.deb\n Size/MD5: 61302 934f995a352040b03daf4b4462da2892\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-17ubuntu3.1_powerpc.deb\n Size/MD5: 57414 31f122cc6a44e90c362dda241b98648c\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-17ubuntu3.1_sparc.deb\n Size/MD5: 37204 d11aa276b3c4049110c587b2131d1207\n http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-17ubuntu3.1_sparc.deb\n Size/MD5: 117558 c29f382879fce337b440b71cb3a88b3d\n http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-17ubuntu3.1_sparc.deb\n Size/MD5: 1462180 9c40f63f4c088299eec0d97317c53a3a\n http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-17ubuntu3.1_sparc.deb\n Size/MD5: 2201794 00f9c319e7fd6b9eeed508baba656d21\n http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-17ubuntu3.1_sparc.deb\n Size/MD5: 344712 9f8df2c64cff337847abca91c4e3fb1f\n http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-17ubuntu3.1_sparc.deb\n Size/MD5: 169558 555c2de1cc4ff90754500bb42947453e\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-17ubuntu3.1_sparc.deb\n Size/MD5: 57850 d5d1dc89040b20f04c6a99d14524a6d1\n http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-17ubuntu3.1_sparc.deb\n Size/MD5: 49686 46af0e0b82ed5cc1d562909eacd9a35c\n\n\n. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n\n Mandriva Linux Security Advisory MDVSA-2009:282-1\n http://www.mandriva.com/security/\n _______________________________________________________________________\n\n Package : cups\n Date : December 7, 2009\n Affected: 2008.0\n _______________________________________________________________________\n\n Problem Description:\n\n Multiple integer overflows in the JBIG2 decoder in\n Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and\n other products allow remote attackers to cause a denial\n of service (crash) via a crafted PDF file, related to (1)\n JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg,\n and (3) JBIG2Stream::readGenericBitmap. (CVE-2009-0163)\n \n Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier,\n as used in Poppler and other products, when running on Mac OS X,\n has unspecified impact, related to g*allocn. (CVE-2009-0166)\n \n Heap-based buffer overflow in Xpdf 3.02pl2 and earlier, CUPS 1.3.9,\n and probably other products, allows remote attackers to execute\n arbitrary code via a PDF file with crafted JBIG2 symbol dictionary\n segments (CVE-2009-0195). NOTE:\n the JBIG2Stream.cxx vector may overlap CVE-2009-1179. (CVE-2009-0799)\n \n Multiple input validation flaws in the JBIG2 decoder in Xpdf 3.02pl2\n and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and\n other products allow remote attackers to execute arbitrary code via\n a crafted PDF file. (CVE-2009-0949)\n \n Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier,\n CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products\n allows remote attackers to execute arbitrary code via a crafted PDF\n file. (CVE-2009-1179)\n \n The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier,\n Poppler before 0.10.6, and other products allows remote attackers to\n execute arbitrary code via a crafted PDF file that triggers a free\n of invalid data. (CVE-2009-1181)\n \n Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2\n and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and\n other products allow remote attackers to execute arbitrary code via\n a crafted PDF file. (CVE-2009-1182)\n \n The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and\n earlier, Poppler before 0.10.6, and other products allows remote\n attackers to cause a denial of service (infinite loop and hang)\n via a crafted PDF file. (CVE-2009-1183)\n \n Two integer overflow flaws were found in the CUPS pdftops filter. An\n attacker could create a malicious PDF file that would cause pdftops\n to crash or, potentially, execute arbitrary code as the lp user if\n the file was printed. (CVE-2009-3608, CVE-2009-3609)\n \n This update corrects the problems. \n\n Update:\n\n Packages for 2008.0 are being provided due to extended support for\n Corporate products. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2008.0:\n 6b17f59f63c062c017c78d459dd2d89a 2008.0/i586/cups-1.3.10-0.1mdv2008.0.i586.rpm\n 9bc5298d9895c356227fdda3a0ddb2c0 2008.0/i586/cups-common-1.3.10-0.1mdv2008.0.i586.rpm\n e3583883df8532fc8c496866dac713f8 2008.0/i586/cups-serial-1.3.10-0.1mdv2008.0.i586.rpm\n fac1fcb839ad53322a447d4d39f769e3 2008.0/i586/libcups2-1.3.10-0.1mdv2008.0.i586.rpm\n 3d65afc590fb8520d68b2a3e8e1da696 2008.0/i586/libcups2-devel-1.3.10-0.1mdv2008.0.i586.rpm\n 9e09ed22a2522ee45e93e0edc146193f 2008.0/i586/libpoppler2-0.6-3.5mdv2008.0.i586.rpm\n 7427b1f56387e84db5a15aad85b424d2 2008.0/i586/libpoppler-devel-0.6-3.5mdv2008.0.i586.rpm\n 67937a584d365d6b00ef688c88e8d7c5 2008.0/i586/libpoppler-glib2-0.6-3.5mdv2008.0.i586.rpm\n 410dc85c2c7b71ab316be5607c556682 2008.0/i586/libpoppler-glib-devel-0.6-3.5mdv2008.0.i586.rpm\n 64d6e14be8d93c7651ce5dc3e2ebc5bf 2008.0/i586/libpoppler-qt2-0.6-3.5mdv2008.0.i586.rpm\n cc9af7e314b6eaa6a8f946fa2c27f298 2008.0/i586/libpoppler-qt4-2-0.6-3.5mdv2008.0.i586.rpm\n 0c6d3a6b5211e8506a89144b8c3a3cfb 2008.0/i586/libpoppler-qt4-devel-0.6-3.5mdv2008.0.i586.rpm\n c985516638ed4d8f792daa13bd506023 2008.0/i586/libpoppler-qt-devel-0.6-3.5mdv2008.0.i586.rpm\n 8d05619dcef538092696ce70998abd20 2008.0/i586/php-cups-1.3.10-0.1mdv2008.0.i586.rpm\n 0bae2a3525b796882d2cc87853945e5a 2008.0/i586/poppler-0.6-3.5mdv2008.0.i586.rpm \n f3b53f5fafa8af4d754a5985e5f93830 2008.0/SRPMS/cups-1.3.10-0.1mdv2008.0.src.rpm\n 11b021f4e5d21d199728b9a0a37a8230 2008.0/SRPMS/poppler-0.6-3.5mdv2008.0.src.rpm\n\n Mandriva Linux 2008.0/X86_64:\n 8249475feb3bdc74ea7060944baed6aa 2008.0/x86_64/cups-1.3.10-0.1mdv2008.0.x86_64.rpm\n 83951504acb783cfdb8ec4fe48d31e1e 2008.0/x86_64/cups-common-1.3.10-0.1mdv2008.0.x86_64.rpm\n fa8a91e8e3bc8f11c19ab460d1f690fe 2008.0/x86_64/cups-serial-1.3.10-0.1mdv2008.0.x86_64.rpm\n e061fdbeded2d97bb3ca6b34d33cb384 2008.0/x86_64/lib64cups2-1.3.10-0.1mdv2008.0.x86_64.rpm\n 893235ea8cf23295ae961ea2de0b9903 2008.0/x86_64/lib64cups2-devel-1.3.10-0.1mdv2008.0.x86_64.rpm\n 9844640563afdef4a870e2ed12e58136 2008.0/x86_64/lib64poppler2-0.6-3.5mdv2008.0.x86_64.rpm\n 06ea824a6a2cd9360a9e75a14718192a 2008.0/x86_64/lib64poppler-devel-0.6-3.5mdv2008.0.x86_64.rpm\n bb0eb04fa906a352e6738d08f116f89b 2008.0/x86_64/lib64poppler-glib2-0.6-3.5mdv2008.0.x86_64.rpm\n 43d6a85dfdad7e969655ee4e2a377370 2008.0/x86_64/lib64poppler-glib-devel-0.6-3.5mdv2008.0.x86_64.rpm\n eef29dde4b9e80d4c360e953cbe9110b 2008.0/x86_64/lib64poppler-qt2-0.6-3.5mdv2008.0.x86_64.rpm\n c74dc9f245091f451441d8b88f0beed3 2008.0/x86_64/lib64poppler-qt4-2-0.6-3.5mdv2008.0.x86_64.rpm\n 60345458274afc6ff480317fc408ec52 2008.0/x86_64/lib64poppler-qt4-devel-0.6-3.5mdv2008.0.x86_64.rpm\n 0a880b9c0d655c10f5757882e30911f1 2008.0/x86_64/lib64poppler-qt-devel-0.6-3.5mdv2008.0.x86_64.rpm\n eb6fde793ac0d7ea86df42aa22637807 2008.0/x86_64/php-cups-1.3.10-0.1mdv2008.0.x86_64.rpm\n 7f475f07368ed9158008f2891dce2cd6 2008.0/x86_64/poppler-0.6-3.5mdv2008.0.x86_64.rpm \n f3b53f5fafa8af4d754a5985e5f93830 2008.0/SRPMS/cups-1.3.10-0.1mdv2008.0.src.rpm\n 11b021f4e5d21d199728b9a0a37a8230 2008.0/SRPMS/poppler-0.6-3.5mdv2008.0.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFLHXsgmqjQ0CJFipgRAu1fAKCINX1H5StX89GjMDWzGrEM1UiHeACeMLSY\na3mQtrfvoibfn29OFAfdSn0=\n=lTbL\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. \n\n\nFor the oldstable distribution (etch), this problem has been fixed in\nversion 1.2.7-4+etch8 of cupsys. \n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 1.3.8-1+lenny6 of cups. \n\nFor the testing distribution (squeeze), this problem will be fixed soon. \n\nFor the unstable distribution (sid), this problem will be fixed soon. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nDebian (oldstable)\n- ------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7.orig.tar.gz\n Size/MD5 checksum: 4214272 c9ba33356e5bb93efbcf77b6e142e498\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8.dsc\n Size/MD5 checksum: 1094 42b2e4d0d1709d31270cbd0361ded3f4\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8.diff.gz\n Size/MD5 checksum: 109744 c73260161da939be7517c6ff0c5493cb\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-common_1.2.7-4+etch8_all.deb\n Size/MD5 checksum: 921366 4cec0d4b82b768bd42c801e87831eec9\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.2.7-4+etch8_all.deb\n Size/MD5 checksum: 46424 bc032e7d1c4520843b540d3bb238d3a3\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_alpha.deb\n Size/MD5 checksum: 72856 a2c626b3f8dd8e43cecc395c5cf9ef03\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_alpha.deb\n Size/MD5 checksum: 1614886 8286658ca407d05ecc87ea4cd2dc870a\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_alpha.deb\n Size/MD5 checksum: 183730 f2c644de893bf0ca28868cfecefca04d\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_alpha.deb\n Size/MD5 checksum: 85916 7233e6ec6bb857653d2829cd80012d41\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_alpha.deb\n Size/MD5 checksum: 1093518 e6544fc0edd973d09a1e00652991845b\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_alpha.deb\n Size/MD5 checksum: 96030 23aca27ae72c081612fb247cfd9e33da\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_alpha.deb\n Size/MD5 checksum: 39332 a931e92b73c1004f4c8ed110c01ac728\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_alpha.deb\n Size/MD5 checksum: 175552 8bb48e7fdb170d74a14e65aecee3b230\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_amd64.deb\n Size/MD5 checksum: 1087540 1e71685c6620845318d49cf1fcf5feb0\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_amd64.deb\n Size/MD5 checksum: 87128 281a245270d6c2dcd7f0e1a6fc7d0b12\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_amd64.deb\n Size/MD5 checksum: 37572 c0491559f8465d610a0577cc23f00de5\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_amd64.deb\n Size/MD5 checksum: 162892 42d1cf5ceaa5ed7a95f16b869e6df97f\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_amd64.deb\n Size/MD5 checksum: 80862 511e522206e17f759cd7c56e934f08bd\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_amd64.deb\n Size/MD5 checksum: 1572040 e2582ab015e6e3a3858b713d6f159a34\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_amd64.deb\n Size/MD5 checksum: 53056 d4c82327123ddc2c0e48c804634603ae\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_amd64.deb\n Size/MD5 checksum: 142418 d9314cb33230b9c6dbe571671b14adda\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_arm.deb\n Size/MD5 checksum: 1023048 8b559f55ae312c59e22a113fd6928c5f\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_arm.deb\n Size/MD5 checksum: 36758 cb2e80f86795f10af3fc100aa4506def\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_arm.deb\n Size/MD5 checksum: 1567912 776f4974949a31b3facd38b302b8097a\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_arm.deb\n Size/MD5 checksum: 78698 6122e3902076dd2c3247dd4b5a56a660\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_arm.deb\n Size/MD5 checksum: 48958 92730848f69e8540412fdf8bdfb96c1f\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_arm.deb\n Size/MD5 checksum: 85496 230c5b107dff69eca6f8d6241277a95f\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_arm.deb\n Size/MD5 checksum: 154962 8803b8b5ac7a11e3a2cf5a40f389d049\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_arm.deb\n Size/MD5 checksum: 131674 22e1a6767fc65ac920a5ce245743f9fd\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_hppa.deb\n Size/MD5 checksum: 154688 26ee139a8daabd621479d73ac2d04a16\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_hppa.deb\n Size/MD5 checksum: 1628398 beed29d0d6a15e33a83206acf3380cce\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_hppa.deb\n Size/MD5 checksum: 57246 07d89a1799a8b8daf3fb13f8c0b155d3\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_hppa.deb\n Size/MD5 checksum: 86802 f4e4a831a178e7e9df1f66a3af3633fb\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_hppa.deb\n Size/MD5 checksum: 172252 78031fa93b94ba44187e0986e82d6201\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_hppa.deb\n Size/MD5 checksum: 40370 b203925426b9411027184af8af2f73d6\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_hppa.deb\n Size/MD5 checksum: 1037196 85cd25d326e4535a9a18921e1016788d\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_hppa.deb\n Size/MD5 checksum: 91586 1ef7a9dd2be035a8504bd124e1da385d\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_i386.deb\n Size/MD5 checksum: 137728 7f9d176b0cb1e5976ea06e58526a60f4\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_i386.deb\n Size/MD5 checksum: 87336 3b3b4ffad78f35ffc5e05941bdfc15bd\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_i386.deb\n Size/MD5 checksum: 37416 3513b7cef1c51a35efd9ffd3c294e14d\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_i386.deb\n Size/MD5 checksum: 1000830 28dedcb611ed0538308122b860ba58c8\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_i386.deb\n Size/MD5 checksum: 53206 d0ae9184a84597d989b69fe7e25bc470\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_i386.deb\n Size/MD5 checksum: 1560356 5a8dc9c147a9d5c82224478f64731f0f\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_i386.deb\n Size/MD5 checksum: 79744 40326a8b68de9dbe6987e39fe95a13f8\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_i386.deb\n Size/MD5 checksum: 160956 da17f9d144495fde4e4c8bbad95560e8\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_ia64.deb\n Size/MD5 checksum: 106218 609f68aa16bfd657583e8be99a2ad0c1\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_ia64.deb\n Size/MD5 checksum: 74386 f0259501885d635d40aab9308a1bfbf3\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_ia64.deb\n Size/MD5 checksum: 192362 9009b4a91e64ab0a1c325bcaec97c2e0\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_ia64.deb\n Size/MD5 checksum: 1108908 1db7bb18903f47d5de29482709e3ff78\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_ia64.deb\n Size/MD5 checksum: 1771178 f104a7cc65ef288cd7758bb2175709a0\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_ia64.deb\n Size/MD5 checksum: 204522 8628cbc5cf2b22ed1d4eaeda2d7b4a60\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_ia64.deb\n Size/MD5 checksum: 46334 726f90dd146cd9d2d6ad964c0e718585\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_ia64.deb\n Size/MD5 checksum: 107424 c3c93da377fee4bf48f57778b305d5db\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_mips.deb\n Size/MD5 checksum: 1098528 5a9e021f7509cbde95ef66da819c3228\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_mips.deb\n Size/MD5 checksum: 150986 db510250f4f5aac631a743f04dc8054d\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_mips.deb\n Size/MD5 checksum: 36124 d8663fcdd8acb88018af29a3af61c9f6\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_mips.deb\n Size/MD5 checksum: 158310 776e9b5f14047779211e1262ae9f62d0\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_mips.deb\n Size/MD5 checksum: 76166 26a80a28871b162d72c2469a18ce6966\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_mips.deb\n Size/MD5 checksum: 87110 f71b2aa6af126f5ae434e1381126fc34\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_mips.deb\n Size/MD5 checksum: 1568290 ad4192ffb0d477ae964f6c3b039e52ac\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_mips.deb\n Size/MD5 checksum: 57678 da4e6ba9b1a61ad4bdc6a8e8d682fc61\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_mipsel.deb\n Size/MD5 checksum: 87254 e2917b072751a45afba30498006b71c3\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_mipsel.deb\n Size/MD5 checksum: 150894 09067f14c0938ef6dbeb500256dd42f9\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_mipsel.deb\n Size/MD5 checksum: 1553678 c4168376ca4d74744e24be76ec159067\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_mipsel.deb\n Size/MD5 checksum: 158842 f6d3053079e08de8e617272fd4a8489d\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_mipsel.deb\n Size/MD5 checksum: 1086490 e82ba4868d85ad36861a8aff82f6f72a\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_mipsel.deb\n Size/MD5 checksum: 36070 c67551d542db6a7b5081b8f0e1bdf30e\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_mipsel.deb\n Size/MD5 checksum: 57804 fa0c855349bfa38f31c82e83374ccdab\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_mipsel.deb\n Size/MD5 checksum: 77446 936b8d1173c259822d9e5ae3e82eb357\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_powerpc.deb\n Size/MD5 checksum: 41342 f5d1131ddc30cb780322237c47411177\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_powerpc.deb\n Size/MD5 checksum: 1147440 23944aceda9e865a4aab581509bb4058\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_powerpc.deb\n Size/MD5 checksum: 89404 9a0198042c3eb4ef053f720d20706c34\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_powerpc.deb\n Size/MD5 checksum: 163446 75275152a9b69f479d4b0c6ae8fb3fa0\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_powerpc.deb\n Size/MD5 checksum: 1582758 4544b9bc4aaf231fe604449311f118b9\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_powerpc.deb\n Size/MD5 checksum: 89574 942740b75d722b0fcbf284bc05035e48\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_powerpc.deb\n Size/MD5 checksum: 136242 5ef0278b80c263897d8942f9bc03631e\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_powerpc.deb\n Size/MD5 checksum: 51926 a35183dcb7bc3a0490b2ee1d8ed5ab3d\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_s390.deb\n Size/MD5 checksum: 82334 745d2f27c678f02ad011fa15f1731560\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_s390.deb\n Size/MD5 checksum: 1587692 d3c2245878121c7c16752f2b9949d0dc\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_s390.deb\n Size/MD5 checksum: 166998 64e5615906a50a2c19ee5359a521a9f6\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_s390.deb\n Size/MD5 checksum: 52522 199020914a0d52a771d112c6b2823de8\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_s390.deb\n Size/MD5 checksum: 1037546 89b9f600cc2a513678446a2a2fcb5b81\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_s390.deb\n Size/MD5 checksum: 88194 b376557a4f613fb65f46cbfae42050bf\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_s390.deb\n Size/MD5 checksum: 144934 da63d5b24df68891c2806f0f514911e6\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_s390.deb\n Size/MD5 checksum: 37422 3b0a8733a1ef7bf6fae8f00bb306bceb\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_sparc.deb\n Size/MD5 checksum: 78608 fb366ff39679d91c983deb2022ec0f0c\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_sparc.deb\n Size/MD5 checksum: 159716 eb0065adeacdf8a7f23098195a515e03\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_sparc.deb\n Size/MD5 checksum: 86066 5c0f9c078202fbf4c2f9c7cae3c89057\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_sparc.deb\n Size/MD5 checksum: 1578044 a94273670520f2db0fd4767ecb93cc4c\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_sparc.deb\n Size/MD5 checksum: 36060 b54d8ba11e9f8fd155e0b29f1609ebcd\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_sparc.deb\n Size/MD5 checksum: 51832 cb3bf2ee0f2d4661cd8198f8da780d00\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_sparc.deb\n Size/MD5 checksum: 996840 5609f09834fb8eecc031ad52bb1ba550\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_sparc.deb\n Size/MD5 checksum: 138744 5e701d9b2c7941e857c143e7289c3a20\n\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nDebian (stable)\n- ---------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6.diff.gz\n Size/MD5 checksum: 185068 01548b71a9c9f8f3cd4c4e38be162e0c\n http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6.dsc\n Size/MD5 checksum: 1837 74c7cc9607928673ef30937fa74d154c\n http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8.orig.tar.gz\n Size/MD5 checksum: 4796827 10efe9825c1a1dcd325be47a6cc21faf\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/c/cups/cupsys_1.3.8-1+lenny6_all.deb\n Size/MD5 checksum: 52146 7e655df3208e7b1c14e963e62d2a1f9e\n http://security.debian.org/pool/updates/main/c/cups/libcupsys2-dev_1.3.8-1+lenny6_all.deb\n Size/MD5 checksum: 52174 ca30676d4f14b19d69f07948ec920645\n http://security.debian.org/pool/updates/main/c/cups/cupsys-client_1.3.8-1+lenny6_all.deb\n Size/MD5 checksum: 52172 0745ebb9d35b06b2baed0946c9c4cdf4\n http://security.debian.org/pool/updates/main/c/cups/cupsys-dbg_1.3.8-1+lenny6_all.deb\n Size/MD5 checksum: 52162 39dda2a8979e6d53d369a850a7287f98\n http://security.debian.org/pool/updates/main/c/cups/cupsys-bsd_1.3.8-1+lenny6_all.deb\n Size/MD5 checksum: 52162 185cdcccb15621495bb4dd922824fb27\n http://security.debian.org/pool/updates/main/c/cups/cupsys-common_1.3.8-1+lenny6_all.deb\n Size/MD5 checksum: 52162 7cfc925b6070373cb03f50e28ffcb5eb\n http://security.debian.org/pool/updates/main/c/cups/cups-common_1.3.8-1+lenny6_all.deb\n Size/MD5 checksum: 1180808 ab548a8679a470d91055cb14a524f019\n http://security.debian.org/pool/updates/main/c/cups/libcupsys2_1.3.8-1+lenny6_all.deb\n Size/MD5 checksum: 52166 808680daaacf24e6969a46b5821c05b4\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_alpha.deb\n Size/MD5 checksum: 37990 1d176c775ae611d5de6fc28debeac312\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_alpha.deb\n Size/MD5 checksum: 108462 bee5be572e1c162c31a2f2cb6fccd95b\n http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_alpha.deb\n Size/MD5 checksum: 118450 c6848af4b97d419426046f53c0a10c8b\n http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_alpha.deb\n Size/MD5 checksum: 445916 a291be3dfa900c17126ce9796d71db2a\n http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_alpha.deb\n Size/MD5 checksum: 2099172 fabc17ee844d661b518a4c35321c5128\n http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_alpha.deb\n Size/MD5 checksum: 1142836 46addc9aade19f27e42b443768023f94\n http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_alpha.deb\n Size/MD5 checksum: 179128 0c7440b785436020854b72114e9e7686\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_alpha.deb\n Size/MD5 checksum: 81496 5235f6c116886ee493467ff1e52dff9f\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_amd64.deb\n Size/MD5 checksum: 168874 34599b5781a04df793603da238d30224\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_amd64.deb\n Size/MD5 checksum: 61012 fcd44c54190e1f2212335b0f971b2241\n http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_amd64.deb\n Size/MD5 checksum: 1197270 584dbf166833f9f50a43137f1e2c04f7\n http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_amd64.deb\n Size/MD5 checksum: 2070558 64782a03e7391d3b983fe918b6d416a6\n http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_amd64.deb\n Size/MD5 checksum: 116780 317905cae4f2ba4acbdb62cc46b87e2a\n http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_amd64.deb\n Size/MD5 checksum: 401290 bdd244d1e6559d959eb803f8bd6abbf2\n http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_amd64.deb\n Size/MD5 checksum: 37236 b3642bfa15ff0fe3c6d983e031275da6\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_amd64.deb\n Size/MD5 checksum: 99702 17dbaea17495777f8ba8a2996acc3725\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_arm.deb\n Size/MD5 checksum: 387466 6ac7763fc0ade8a3703104cdd3c3357a\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_arm.deb\n Size/MD5 checksum: 97190 e274997fb4e49c281c21549b1120efb2\n http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_arm.deb\n Size/MD5 checksum: 113164 eaa19c4d0964cd38613ab2c58f07ce26\n http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_arm.deb\n Size/MD5 checksum: 2059026 ee1367a147b8c07bae9c87ccc87c4998\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_arm.deb\n Size/MD5 checksum: 55342 c57db0444dc9193f0ab35e1a934400ec\n http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_arm.deb\n Size/MD5 checksum: 155270 5f0300fb74cb89f6b9b7bb45537f4aec\n http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_arm.deb\n Size/MD5 checksum: 1123418 df0367cba01ba9919f409b022dbe7c1b\n http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_arm.deb\n Size/MD5 checksum: 36484 7294561d854c324dc268c8fb0d616a2a\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_armel.deb\n Size/MD5 checksum: 1128236 5fb35a72133c870e444fe0b1250db6b2\n http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_armel.deb\n Size/MD5 checksum: 38752 777da1a892c9d354f5e1ae2575b97d47\n http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_armel.deb\n Size/MD5 checksum: 2075760 a850581323f50e10ded793a321763a39\n http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_armel.deb\n Size/MD5 checksum: 387318 64dc6d3b023d3de8a9ad99c244555008\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_armel.deb\n Size/MD5 checksum: 98356 96861930db8e85257fa250312839d177\n http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_armel.deb\n Size/MD5 checksum: 119314 7a4acbab9f1600e266780b8e4edc8161\n http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_armel.deb\n Size/MD5 checksum: 156808 a67d3ee08ed7bbcee2d90e45b4c5d9fc\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_armel.deb\n Size/MD5 checksum: 54730 26bc079114200f249ee55182577d978b\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_hppa.deb\n Size/MD5 checksum: 102958 61cca5c9fe91de9823fe3b141df6cbfd\n http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_hppa.deb\n Size/MD5 checksum: 2118150 9a34c8fcfda89744ff1ed5cb57fdeae1\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_hppa.deb\n Size/MD5 checksum: 63136 dcc115ea567651075e3b7fbf73477f2c\n http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_hppa.deb\n Size/MD5 checksum: 406484 36b77c3f6c05df1f44b9a971b2fd3bc8\n http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_hppa.deb\n Size/MD5 checksum: 121714 30743045e4927713923ab1f3bb9e6360\n http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_hppa.deb\n Size/MD5 checksum: 1141670 a1d27d8aec34d3e1cefd8af9d680fdce\n http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_hppa.deb\n Size/MD5 checksum: 172628 bc5c1f4a039c3fb8dbfdd0dc36aa2f56\n http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_hppa.deb\n Size/MD5 checksum: 39974 b00448f41ec531188e029bc7173f5271\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_i386.deb\n Size/MD5 checksum: 99256 289e9977f36773c117b6fcc6580b464f\n http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_i386.deb\n Size/MD5 checksum: 1096046 28adf6b61f8bff81e19ee5b7fc464aac\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_i386.deb\n Size/MD5 checksum: 60422 d4646115f417b7d56b1665283e914b42\n http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_i386.deb\n Size/MD5 checksum: 115956 4db026d788ab7bcb923847491f46b8ca\n http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_i386.deb\n Size/MD5 checksum: 2051272 6b1ce4707c65c46af6ae766ce9b50e99\n http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_i386.deb\n Size/MD5 checksum: 165348 ffd04ab3b875fef36b26fe3dd1106996\n http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_i386.deb\n Size/MD5 checksum: 393998 080d022507d07a4713b3f95acb7c22f6\n http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_i386.deb\n Size/MD5 checksum: 38022 7990b6a4a8d217fe07e7e1bd0f9108ff\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_ia64.deb\n Size/MD5 checksum: 2281420 2adc4c08d3bc24c8d70acac31ca8421a\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_ia64.deb\n Size/MD5 checksum: 123434 e3c1cbbd801a0ddd985e3b27c021b9d8\n http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_ia64.deb\n Size/MD5 checksum: 209034 5bfbe9000e4f1cafdbc66a6a94c20e7b\n http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_ia64.deb\n Size/MD5 checksum: 1149350 7f6b259e7f4ecc70accf51236efb3a5a\n http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_ia64.deb\n Size/MD5 checksum: 41278 1cee7bf398c2e2c7e4189f005cbb3444\n http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_ia64.deb\n Size/MD5 checksum: 139124 8ff9597b3e2cd534614a66531a5db361\n http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_ia64.deb\n Size/MD5 checksum: 447412 b59175ffef15d9b2e618b85ce6f8cff2\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_ia64.deb\n Size/MD5 checksum: 86018 e5badf6982128286853fc360fc77a4d3\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_mips.deb\n Size/MD5 checksum: 157842 c3652835b110a94fc5a5f9d20230e443\n http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_mips.deb\n Size/MD5 checksum: 2047282 ce608c3fa6d89e7d7ff3e313f88fbef2\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_mips.deb\n Size/MD5 checksum: 98662 ddbba9bea120f9b7740adc8ceb45c3dc\n http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_mips.deb\n Size/MD5 checksum: 108508 0a5b6ba27061cfa40e45cfc514d3ba0d\n http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_mips.deb\n Size/MD5 checksum: 36010 a786245e49b8cabcaad41a5e92a5c884\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_mips.deb\n Size/MD5 checksum: 65290 155e5959fac035fc8307800061913d35\n http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_mips.deb\n Size/MD5 checksum: 1170866 11910e0f1ccbb2f3ba151cbfe8186696\n http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_mips.deb\n Size/MD5 checksum: 405510 4f848ff0dd8f2b08f3fa3bb220a6f75c\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_mipsel.deb\n Size/MD5 checksum: 158274 8c3b143ee488c17cf00cf7599bee331c\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_mipsel.deb\n Size/MD5 checksum: 98792 74a91f31a602f6f2a0c04b4e72723b86\n http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_mipsel.deb\n Size/MD5 checksum: 1156060 f3be7e74bd904dfdecc086bc6ee16bf5\n http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_mipsel.deb\n Size/MD5 checksum: 403142 42cf44870e91355bb7a465dce52605ae\n http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_mipsel.deb\n Size/MD5 checksum: 36142 daa9ed0b87002a002bece0890b1a6e12\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_mipsel.deb\n Size/MD5 checksum: 65216 a1c8b686980e932f19a789430a4eafaa\n http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_mipsel.deb\n Size/MD5 checksum: 2028136 a67cf50db9734a8175936ff5e2d45d5d\n http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_mipsel.deb\n Size/MD5 checksum: 109968 23ff5d8a36aecd545c5cf210bc3873d5\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_powerpc.deb\n Size/MD5 checksum: 394114 5309447c955f4decbe93f50802ed1805\n http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_powerpc.deb\n Size/MD5 checksum: 1188662 f8438353bab0a00502a1687042c54961\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_powerpc.deb\n Size/MD5 checksum: 61144 ac80e1cd5cc0661c10693d360e32c11d\n http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_powerpc.deb\n Size/MD5 checksum: 174232 5938321743bda64571c6d0797f84dca1\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_powerpc.deb\n Size/MD5 checksum: 104730 d5f60c53825c532dca34cb21f1c1d2fb\n http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_powerpc.deb\n Size/MD5 checksum: 44212 d0b547b8cf87254ce65874df057468db\n http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_powerpc.deb\n Size/MD5 checksum: 136102 34f3fbb1bf5519277c20944b3d118a6c\n http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_powerpc.deb\n Size/MD5 checksum: 2122006 f0e6902972831c2490b6f6bcbecd1ba0\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_s390.deb\n Size/MD5 checksum: 101502 e48e528e2b3ee8140dcce180aae0feb8\n http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_s390.deb\n Size/MD5 checksum: 37818 7f26d32ff01aa1088e424a16439d0990\n http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_s390.deb\n Size/MD5 checksum: 171544 131841fd12d9331c312f8a28718fe8a1\n http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_s390.deb\n Size/MD5 checksum: 399662 f80688352e705e1293d64bb211dcd568\n http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_s390.deb\n Size/MD5 checksum: 2090700 7d406321bb349547bdbe43123fb770f3\n http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_s390.deb\n Size/MD5 checksum: 118588 64d6969a96a76de52a7296c745116a48\n http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_s390.deb\n Size/MD5 checksum: 1188192 365ee760b0b9b8dd869dd11f1f4c42f9\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_s390.deb\n Size/MD5 checksum: 60716 634f2ba3cc0eb22c59252f15a1582770\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_sparc.deb\n Size/MD5 checksum: 390982 1235ace473b594360267daef5663c1b3\n http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_sparc.deb\n Size/MD5 checksum: 116666 3c08364f33b2594c4f8be8c0bfce7333\n http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_sparc.deb\n Size/MD5 checksum: 1051168 056faed5a5baf927d91b21b4fe624812\n http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_sparc.deb\n Size/MD5 checksum: 38374 6401223175cfcf9082f3fac43a4f9d42\n http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_sparc.deb\n Size/MD5 checksum: 2069062 4041871842ca0f29408c95c39f9cbb68\n http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_sparc.deb\n Size/MD5 checksum: 160772 6a682010c72d5d78f4a6efcfb3ed5955\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_sparc.deb\n Size/MD5 checksum: 57762 478e92cd02d8acb20a600d4ca61aba39\n http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_sparc.deb\n Size/MD5 checksum: 96996 37446d6e2f9dbf94122db96d1df00b9f\n\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niEYEARECAAYFAkolko8ACgkQHYflSXNkfP+rjwCfWDGEVO8HeUkO9sF09pz0Nvwn\n4GMAn3rgCfJK2rFC5dZyvIzTiyo6CiUb\n=6yYH\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2009-0949" }, { "db": "JVNDB", "id": "JVNDB-2009-001733" }, { "db": "CNNVD", "id": "CNNVD-200906-120" }, { "db": "BID", "id": "35169" }, { "db": "VULHUB", "id": "VHN-38395" }, { "db": "PACKETSTORM", "id": "82086" }, { "db": "PACKETSTORM", "id": "82088" }, { "db": "PACKETSTORM", "id": "78081" }, { "db": "PACKETSTORM", "id": "82087" }, { "db": "PACKETSTORM", "id": "83554" }, { "db": "PACKETSTORM", "id": "78033" } ], "trust": 3.06 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-38395", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-38395" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2009-0949", "trust": 4.2 }, { "db": "BID", "id": "35169", "trust": 2.8 }, { "db": "SECUNIA", "id": "35340", "trust": 2.5 }, { "db": "SECUNIA", "id": "35342", "trust": 2.5 }, { "db": "SECTRACK", "id": "1022321", "trust": 2.5 }, { "db": "SECUNIA", "id": "35328", "trust": 1.7 }, { "db": "SECUNIA", "id": "35685", "trust": 1.7 }, { "db": "SECUNIA", "id": "35322", "trust": 1.7 }, { "db": "SECUNIA", "id": "36701", "trust": 1.7 }, { "db": "XF", "id": "50926", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2009-001733", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20090602 CORE-2009-0420 - APPLE CUPS IPP_TAG_UNSUPPORTED HANDLING NULL POINTER VULNERABILITY", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SR:2009:012", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1811", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-780-1", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2009:1082", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2009:1083", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2009-09-10-2", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200906-120", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "78081", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "78033", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-86277", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "78040", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "33020", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-38395", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "82086", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "82088", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "82087", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "83554", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-38395" }, { "db": "BID", "id": "35169" }, { "db": "JVNDB", "id": "JVNDB-2009-001733" }, { "db": "PACKETSTORM", "id": "82086" }, { "db": "PACKETSTORM", "id": "82088" }, { "db": "PACKETSTORM", "id": "78081" }, { "db": "PACKETSTORM", "id": "82087" }, { "db": "PACKETSTORM", "id": "83554" }, { "db": "PACKETSTORM", "id": "78033" }, { "db": "CNNVD", "id": "CNNVD-200906-120" }, { "db": "NVD", "id": "CVE-2009-0949" } ] }, "id": "VAR-200906-0617", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-38395" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T21:56:36.646000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RHSA-2009", "trust": 0.8, "url": "http://www.cups.org/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001733" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-908", "trust": 1.0 }, { "problemtype": "Use of uninitialized resources (CWE-908) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-399", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-38395" }, { "db": "JVNDB", "id": "JVNDB-2009-001733" }, { "db": "NVD", "id": "CVE-2009-0949" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/35169" }, { "trust": 2.5, "url": "http://securitytracker.com/id?1022321" }, { "trust": 2.5, "url": "http://secunia.com/advisories/35340" }, { "trust": 2.5, "url": "http://secunia.com/advisories/35342" }, { "trust": 2.0, "url": "http://www.coresecurity.com/content/applecups-null-pointer-vulnerability" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2009/sep/msg00004.html" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht3865" }, { "trust": 1.7, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500972" }, { "trust": 1.7, "url": "http://www.debian.org/security/2009/dsa-1811" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2009-1082.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2009-1083.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/35322" }, { "trust": 1.7, "url": "http://secunia.com/advisories/35328" }, { "trust": 1.7, "url": "http://secunia.com/advisories/35685" }, { "trust": 1.7, "url": "http://secunia.com/advisories/36701" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" }, { "trust": 1.7, "url": "http://www.ubuntu.com/usn/usn-780-1" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/50926" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/504032/100/0/threaded" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9631" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50926" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0949" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0949" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/504032/100/0/threaded" }, { "trust": 0.4, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0163" }, { "trust": 0.4, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0147" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0791" }, { "trust": 0.4, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0166" }, { "trust": 0.4, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0146" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3609" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0166" }, { "trust": 0.4, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3609" }, { "trust": 0.4, "url": "http://www.mandriva.com/security/" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0147" }, { "trust": 0.4, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0791" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0163" }, { "trust": 0.4, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.4, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3608" }, { "trust": 0.4, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0949" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0146" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3608" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2009-227.htm" }, { "trust": 0.3, "url": "http://www.cups.org" }, { "trust": 0.3, "url": "/archive/1/504032" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2009-202.htm" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0165" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0165" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1180" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1179" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1182" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1181" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0800" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0799" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0195" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0799" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1180" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1183" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1182" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0800" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1181" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0195" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1179" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1183" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1196" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1196" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu9.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-17ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-17ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu9.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu9.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.14_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.14_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu9.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys-client_1.3.9-17ubuntu3.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.14_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys_1.3.9-2ubuntu9.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu9.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/c/cups/libcupsys2_1.3.9-17ubuntu3.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys_1.3.9-17ubuntu3.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.3.7-1ubuntu3.5_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.14_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-17ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-17ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-17ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu9.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu9.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-common_1.3.9-2ubuntu9.2_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-17ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-17ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.14_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-dbg_1.3.9-17ubuntu3.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.14_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu9.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu9.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.14_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys-bsd_1.3.9-17ubuntu3.1_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu9.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-17ubuntu3.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.14_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-bsd_1.3.9-2ubuntu9.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/c/cups/libcupsys2_1.3.9-2ubuntu9.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-2ubuntu9.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-17ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.14_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu9.2.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu9.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu9.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7.orig.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu9.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu9.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.14_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-2ubuntu9.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-17ubuntu3.1.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu9.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.14_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu9.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-gnutls10_1.2.2-0ubuntu0.6.06.14_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu9.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-17ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-17ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-17ubuntu3.1_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-17ubuntu3.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-17ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-17ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-17ubuntu3.1_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-17ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys-common_1.3.9-2ubuntu9.2_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-17ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.14_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.14_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu9.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-17ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-17ubuntu3.1.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-common_1.3.9-17ubuntu3.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsys2-dev_1.3.9-2ubuntu9.2_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu9.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsys2-dev_1.3.9-17ubuntu3.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-17ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu9.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu9.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-17ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2-dev_1.3.7-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2_1.3.9-17ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-17ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-17ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu9.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-2ubuntu9.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-2ubuntu9.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-2ubuntu9.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-client_1.3.9-2ubuntu9.2_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-17ubuntu3.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu9.2.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-17ubuntu3.1_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu9.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-17ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9-2ubuntu9.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-17ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.14_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups_1.3.9.orig.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-17ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu9.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cupsys-dbg_1.3.9-2ubuntu9.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-17ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.14.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-bsd_1.3.9-2ubuntu9.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu9.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-17ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/c/cups/cupsys-common_1.3.9-17ubuntu3.1_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-17ubuntu3.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.14_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.14_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-17ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.14_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu9.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-bsd_1.3.9-17ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsys2_1.3.7-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-client_1.3.9-17ubuntu3.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-2ubuntu9.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-2ubuntu9.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu9.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2-dev_1.3.9-17ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcups2_1.3.9-17ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcupsimage2_1.3.9-2ubuntu9.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.14_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups_1.3.9-2ubuntu9.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/libcupsimage2-dev_1.3.7-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.14_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/cups-client_1.3.9-17ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.14_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.7-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/cups-dbg_1.3.9-2ubuntu9.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2_1.3.9-2ubuntu9.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cups/libcupsimage2-dev_1.3.9-17ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys-bsd_1.3.7-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.14_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.14_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cups/libcups2-dev_1.3.9-17ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.14_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.14_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.7-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/c/cupsys/cupsys_1.3.7-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_amd64.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cupsys-bsd_1.3.8-1+lenny6_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-common_1.3.8-1+lenny6_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-common_1.2.7-4+etch8_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cupsys_1.3.8-1+lenny6_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsys2_1.3.8-1+lenny6_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cupsys-client_1.3.8-1+lenny6_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_arm.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.2.7-4+etch8_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsys2-dev_1.3.8-1+lenny6_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cupsys-dbg_1.3.8-1+lenny6_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cupsys-common_1.3.8-1+lenny6_all.deb" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_mips.deb" } ], "sources": [ { "db": "VULHUB", "id": "VHN-38395" }, { "db": "BID", "id": "35169" }, { "db": "JVNDB", "id": "JVNDB-2009-001733" }, { "db": "PACKETSTORM", "id": "82086" }, { "db": "PACKETSTORM", "id": "82088" }, { "db": "PACKETSTORM", "id": "78081" }, { "db": "PACKETSTORM", "id": "82087" }, { "db": "PACKETSTORM", "id": "83554" }, { "db": "PACKETSTORM", "id": "78033" }, { "db": "CNNVD", "id": "CNNVD-200906-120" }, { "db": "NVD", "id": "CVE-2009-0949" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-38395" }, { "db": "BID", "id": "35169" }, { "db": "JVNDB", "id": "JVNDB-2009-001733" }, { "db": "PACKETSTORM", "id": "82086" }, { "db": "PACKETSTORM", "id": "82088" }, { "db": "PACKETSTORM", "id": "78081" }, { "db": "PACKETSTORM", "id": "82087" }, { "db": "PACKETSTORM", "id": "83554" }, { "db": "PACKETSTORM", "id": "78033" }, { "db": "CNNVD", "id": "CNNVD-200906-120" }, { "db": "NVD", "id": "CVE-2009-0949" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-06-09T00:00:00", "db": "VULHUB", "id": "VHN-38395" }, { "date": "2009-06-02T00:00:00", "db": "BID", "id": "35169" }, { "date": "2009-07-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001733" }, { "date": "2009-10-21T02:32:05", "db": "PACKETSTORM", "id": "82086" }, { "date": "2009-10-21T03:01:09", "db": "PACKETSTORM", "id": "82088" }, { "date": "2009-06-04T22:36:44", "db": "PACKETSTORM", "id": "78081" }, { "date": "2009-10-21T02:57:54", "db": "PACKETSTORM", "id": "82087" }, { "date": "2009-12-08T01:31:40", "db": "PACKETSTORM", "id": "83554" }, { "date": "2009-06-03T04:03:06", "db": "PACKETSTORM", "id": "78033" }, { "date": "2009-06-09T00:00:00", "db": "CNNVD", "id": "CNNVD-200906-120" }, { "date": "2009-06-09T17:30:00.657000", "db": "NVD", "id": "CVE-2009-0949" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-10T00:00:00", "db": "VULHUB", "id": "VHN-38395" }, { "date": "2015-03-19T09:33:00", "db": "BID", "id": "35169" }, { "date": "2024-02-28T07:01:00", "db": "JVNDB", "id": "JVNDB-2009-001733" }, { "date": "2009-06-09T00:00:00", "db": "CNNVD", "id": "CNNVD-200906-120" }, { "date": "2024-02-09T00:17:23.450000", "db": "NVD", "id": "CVE-2009-0949" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "78081" }, { "db": "CNNVD", "id": "CNNVD-200906-120" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CUPS\u00a0 of \u00a0ippReadIO\u00a0 Denial of service in functions \u00a0(DoS)\u00a0 Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001733" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200906-120" } ], "trust": 0.6 } }
ghsa-m37g-v637-95q3
Vulnerability from github
The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.
{ "affected": [], "aliases": [ "CVE-2009-0949" ], "database_specific": { "cwe_ids": [ "CWE-476", "CWE-908" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2009-06-09T17:30:00Z", "severity": "MODERATE" }, "details": "The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.", "id": "GHSA-m37g-v637-95q3", "modified": "2023-12-28T15:30:17Z", "published": "2022-05-02T03:20:00Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0949" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500972" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50926" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9631" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/35322" }, { "type": "WEB", "url": "http://secunia.com/advisories/35328" }, { "type": "WEB", "url": "http://secunia.com/advisories/35340" }, { "type": "WEB", "url": "http://secunia.com/advisories/35342" }, { "type": "WEB", "url": "http://secunia.com/advisories/35685" }, { "type": "WEB", "url": "http://secunia.com/advisories/36701" }, { "type": "WEB", "url": "http://securitytracker.com/id?1022321" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3865" }, { "type": "WEB", "url": "http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability" }, { "type": "WEB", "url": "http://www.debian.org/security/2009/dsa-1811" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-1082.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-1083.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/504032/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/35169" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-780-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
rhsa-2009_1082
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated cups packages that fix one security issue are now available for Red\nHat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Common UNIX\u00ae Printing System (CUPS) provides a portable printing layer\nfor UNIX operating systems. The Internet Printing Protocol (IPP) allows\nusers to print and manage printing-related tasks over a network. \n\nA NULL pointer dereference flaw was found in the CUPS IPP routine, used for\nprocessing incoming IPP requests for the CUPS scheduler. An attacker could\nuse this flaw to send specially-crafted IPP requests that would crash the\ncupsd daemon. (CVE-2009-0949)\n\nRed Hat would like to thank Anibal Sacco from Core Security Technologies\nfor reporting this issue.\n\nUsers of cups are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. After installing this\nupdate, the cupsd daemon will be restarted automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1082", "url": "https://access.redhat.com/errata/RHSA-2009:1082" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "500972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500972" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1082.json" } ], "title": "Red Hat Security Advisory: cups security update", "tracking": { "current_release_date": "2024-11-22T02:45:59+00:00", "generator": { "date": "2024-11-22T02:45:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1082", "initial_release_date": "2009-06-03T15:34:00+00:00", "revision_history": [ { "date": "2009-06-03T15:34:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-06-03T11:42:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:45:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64", "product": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64", "product_id": "cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.3.7-8.el5_3.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.3.7-8.el5_3.6.x86_64", "product": { "name": "cups-devel-1:1.3.7-8.el5_3.6.x86_64", "product_id": "cups-devel-1:1.3.7-8.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.3.7-8.el5_3.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-lpd-1:1.3.7-8.el5_3.6.x86_64", "product": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.x86_64", "product_id": "cups-lpd-1:1.3.7-8.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-lpd@1.3.7-8.el5_3.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.3.7-8.el5_3.6.x86_64", "product": { "name": "cups-libs-1:1.3.7-8.el5_3.6.x86_64", "product_id": "cups-libs-1:1.3.7-8.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.3.7-8.el5_3.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.3.7-8.el5_3.6.x86_64", "product": { "name": "cups-1:1.3.7-8.el5_3.6.x86_64", "product_id": "cups-1:1.3.7-8.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.3.7-8.el5_3.6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.i386", "product": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.i386", "product_id": "cups-debuginfo-1:1.3.7-8.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.3.7-8.el5_3.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.3.7-8.el5_3.6.i386", "product": { "name": "cups-devel-1:1.3.7-8.el5_3.6.i386", "product_id": "cups-devel-1:1.3.7-8.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.3.7-8.el5_3.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.3.7-8.el5_3.6.i386", "product": { "name": "cups-libs-1:1.3.7-8.el5_3.6.i386", "product_id": "cups-libs-1:1.3.7-8.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.3.7-8.el5_3.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-lpd-1:1.3.7-8.el5_3.6.i386", "product": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.i386", "product_id": "cups-lpd-1:1.3.7-8.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-lpd@1.3.7-8.el5_3.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.3.7-8.el5_3.6.i386", "product": { "name": "cups-1:1.3.7-8.el5_3.6.i386", "product_id": "cups-1:1.3.7-8.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.3.7-8.el5_3.6?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.3.7-8.el5_3.6.src", "product": { "name": "cups-1:1.3.7-8.el5_3.6.src", "product_id": "cups-1:1.3.7-8.el5_3.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.3.7-8.el5_3.6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-lpd-1:1.3.7-8.el5_3.6.ia64", "product": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.ia64", "product_id": "cups-lpd-1:1.3.7-8.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-lpd@1.3.7-8.el5_3.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.3.7-8.el5_3.6.ia64", "product": { "name": "cups-libs-1:1.3.7-8.el5_3.6.ia64", "product_id": "cups-libs-1:1.3.7-8.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.3.7-8.el5_3.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.ia64", "product": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.ia64", "product_id": "cups-debuginfo-1:1.3.7-8.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.3.7-8.el5_3.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.3.7-8.el5_3.6.ia64", "product": { "name": "cups-1:1.3.7-8.el5_3.6.ia64", "product_id": "cups-1:1.3.7-8.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.3.7-8.el5_3.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.3.7-8.el5_3.6.ia64", "product": { "name": "cups-devel-1:1.3.7-8.el5_3.6.ia64", "product_id": "cups-devel-1:1.3.7-8.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.3.7-8.el5_3.6?arch=ia64\u0026epoch=1" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "cups-lpd-1:1.3.7-8.el5_3.6.ppc", "product": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.ppc", "product_id": "cups-lpd-1:1.3.7-8.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-lpd@1.3.7-8.el5_3.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.3.7-8.el5_3.6.ppc", "product": { "name": "cups-libs-1:1.3.7-8.el5_3.6.ppc", "product_id": "cups-libs-1:1.3.7-8.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.3.7-8.el5_3.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc", "product": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc", "product_id": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.3.7-8.el5_3.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.3.7-8.el5_3.6.ppc", "product": { "name": "cups-1:1.3.7-8.el5_3.6.ppc", "product_id": "cups-1:1.3.7-8.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.3.7-8.el5_3.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.3.7-8.el5_3.6.ppc", "product": { "name": "cups-devel-1:1.3.7-8.el5_3.6.ppc", "product_id": "cups-devel-1:1.3.7-8.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.3.7-8.el5_3.6?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.3.7-8.el5_3.6.ppc64", "product": { "name": "cups-libs-1:1.3.7-8.el5_3.6.ppc64", "product_id": "cups-libs-1:1.3.7-8.el5_3.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.3.7-8.el5_3.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64", "product": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64", "product_id": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.3.7-8.el5_3.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.3.7-8.el5_3.6.ppc64", "product": { "name": "cups-devel-1:1.3.7-8.el5_3.6.ppc64", "product_id": "cups-devel-1:1.3.7-8.el5_3.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.3.7-8.el5_3.6?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "cups-lpd-1:1.3.7-8.el5_3.6.s390x", "product": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.s390x", "product_id": "cups-lpd-1:1.3.7-8.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-lpd@1.3.7-8.el5_3.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.3.7-8.el5_3.6.s390x", "product": { "name": "cups-libs-1:1.3.7-8.el5_3.6.s390x", "product_id": "cups-libs-1:1.3.7-8.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.3.7-8.el5_3.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390x", "product": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390x", "product_id": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.3.7-8.el5_3.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.3.7-8.el5_3.6.s390x", "product": { "name": "cups-1:1.3.7-8.el5_3.6.s390x", "product_id": "cups-1:1.3.7-8.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.3.7-8.el5_3.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.3.7-8.el5_3.6.s390x", "product": { "name": "cups-devel-1:1.3.7-8.el5_3.6.s390x", "product_id": "cups-devel-1:1.3.7-8.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.3.7-8.el5_3.6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.3.7-8.el5_3.6.s390", "product": { "name": "cups-libs-1:1.3.7-8.el5_3.6.s390", "product_id": "cups-libs-1:1.3.7-8.el5_3.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.3.7-8.el5_3.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390", "product": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390", "product_id": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.3.7-8.el5_3.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.3.7-8.el5_3.6.s390", "product": { "name": "cups-devel-1:1.3.7-8.el5_3.6.s390", "product_id": "cups-devel-1:1.3.7-8.el5_3.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.3.7-8.el5_3.6?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.i386" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.ia64" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.ppc" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.s390x" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.src" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.x86_64" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.i386" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.ia64" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.s390" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.s390x" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.i386" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.ia64" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.ppc" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.ppc64" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.s390" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.s390x" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.x86_64" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.i386" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.ia64" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.ppc" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.ppc64" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.s390" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.s390x" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.x86_64" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.i386" }, "product_reference": "cups-lpd-1:1.3.7-8.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.ia64" }, "product_reference": "cups-lpd-1:1.3.7-8.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.ppc" }, "product_reference": "cups-lpd-1:1.3.7-8.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.s390x" }, "product_reference": "cups-lpd-1:1.3.7-8.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.x86_64" }, "product_reference": "cups-lpd-1:1.3.7-8.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.3.7-8.el5_3.6.i386" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.3.7-8.el5_3.6.ia64" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.3.7-8.el5_3.6.ppc" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.3.7-8.el5_3.6.s390x" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.3.7-8.el5_3.6.src" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.3.7-8.el5_3.6.x86_64" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.i386" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.ia64" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.s390" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.s390x" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.3.7-8.el5_3.6.i386" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.3.7-8.el5_3.6.ia64" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.3.7-8.el5_3.6.ppc" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.3.7-8.el5_3.6.ppc64" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.3.7-8.el5_3.6.s390" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.3.7-8.el5_3.6.s390x" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.3.7-8.el5_3.6.x86_64" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.3.7-8.el5_3.6.i386" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.3.7-8.el5_3.6.ia64" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.3.7-8.el5_3.6.ppc" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.3.7-8.el5_3.6.ppc64" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.3.7-8.el5_3.6.s390" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.3.7-8.el5_3.6.s390x" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.3.7-8.el5_3.6.x86_64" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-lpd-1:1.3.7-8.el5_3.6.i386" }, "product_reference": "cups-lpd-1:1.3.7-8.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-lpd-1:1.3.7-8.el5_3.6.ia64" }, "product_reference": "cups-lpd-1:1.3.7-8.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-lpd-1:1.3.7-8.el5_3.6.ppc" }, "product_reference": "cups-lpd-1:1.3.7-8.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-lpd-1:1.3.7-8.el5_3.6.s390x" }, "product_reference": "cups-lpd-1:1.3.7-8.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-lpd-1:1.3.7-8.el5_3.6.x86_64" }, "product_reference": "cups-lpd-1:1.3.7-8.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.3.7-8.el5_3.6.i386" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.3.7-8.el5_3.6.ia64" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.3.7-8.el5_3.6.ppc" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.3.7-8.el5_3.6.s390x" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.3.7-8.el5_3.6.src" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.3.7-8.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.3.7-8.el5_3.6.x86_64" }, "product_reference": "cups-1:1.3.7-8.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.i386" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.ia64" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.s390" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.s390x" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64" }, "product_reference": "cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.3.7-8.el5_3.6.i386" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.3.7-8.el5_3.6.ia64" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.3.7-8.el5_3.6.ppc" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.3.7-8.el5_3.6.ppc64" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.3.7-8.el5_3.6.s390" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.3.7-8.el5_3.6.s390x" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.3.7-8.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.3.7-8.el5_3.6.x86_64" }, "product_reference": "cups-devel-1:1.3.7-8.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.3.7-8.el5_3.6.i386" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.3.7-8.el5_3.6.ia64" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.3.7-8.el5_3.6.ppc" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.3.7-8.el5_3.6.ppc64" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.3.7-8.el5_3.6.s390" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.3.7-8.el5_3.6.s390x" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.3.7-8.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.3.7-8.el5_3.6.x86_64" }, "product_reference": "cups-libs-1:1.3.7-8.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-lpd-1:1.3.7-8.el5_3.6.i386" }, "product_reference": "cups-lpd-1:1.3.7-8.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-lpd-1:1.3.7-8.el5_3.6.ia64" }, "product_reference": "cups-lpd-1:1.3.7-8.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-lpd-1:1.3.7-8.el5_3.6.ppc" }, "product_reference": "cups-lpd-1:1.3.7-8.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-lpd-1:1.3.7-8.el5_3.6.s390x" }, "product_reference": "cups-lpd-1:1.3.7-8.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.3.7-8.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-lpd-1:1.3.7-8.el5_3.6.x86_64" }, "product_reference": "cups-lpd-1:1.3.7-8.el5_3.6.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Anibal Sacco" ], "organization": "Core Security Technologies" } ], "cve": "CVE-2009-0949", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2009-05-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "500972" } ], "notes": [ { "category": "description", "text": "The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: IPP_TAG_UNSUPPORTED handling NULL pointer dereference DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.i386", "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.ia64", "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.ppc", "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.s390x", "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.src", "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.i386", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.s390", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.i386", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.ia64", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.ppc", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.ppc64", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.s390", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.s390x", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.x86_64", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.i386", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.ia64", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.ppc", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.ppc64", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.s390", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.s390x", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.x86_64", "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.i386", "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.ia64", "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.ppc", "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.s390x", "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.x86_64", "5Client:cups-1:1.3.7-8.el5_3.6.i386", "5Client:cups-1:1.3.7-8.el5_3.6.ia64", "5Client:cups-1:1.3.7-8.el5_3.6.ppc", "5Client:cups-1:1.3.7-8.el5_3.6.s390x", "5Client:cups-1:1.3.7-8.el5_3.6.src", "5Client:cups-1:1.3.7-8.el5_3.6.x86_64", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.i386", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.ia64", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.s390", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.s390x", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64", "5Client:cups-devel-1:1.3.7-8.el5_3.6.i386", "5Client:cups-devel-1:1.3.7-8.el5_3.6.ia64", "5Client:cups-devel-1:1.3.7-8.el5_3.6.ppc", "5Client:cups-devel-1:1.3.7-8.el5_3.6.ppc64", "5Client:cups-devel-1:1.3.7-8.el5_3.6.s390", "5Client:cups-devel-1:1.3.7-8.el5_3.6.s390x", "5Client:cups-devel-1:1.3.7-8.el5_3.6.x86_64", "5Client:cups-libs-1:1.3.7-8.el5_3.6.i386", "5Client:cups-libs-1:1.3.7-8.el5_3.6.ia64", "5Client:cups-libs-1:1.3.7-8.el5_3.6.ppc", "5Client:cups-libs-1:1.3.7-8.el5_3.6.ppc64", "5Client:cups-libs-1:1.3.7-8.el5_3.6.s390", "5Client:cups-libs-1:1.3.7-8.el5_3.6.s390x", "5Client:cups-libs-1:1.3.7-8.el5_3.6.x86_64", "5Client:cups-lpd-1:1.3.7-8.el5_3.6.i386", "5Client:cups-lpd-1:1.3.7-8.el5_3.6.ia64", "5Client:cups-lpd-1:1.3.7-8.el5_3.6.ppc", "5Client:cups-lpd-1:1.3.7-8.el5_3.6.s390x", "5Client:cups-lpd-1:1.3.7-8.el5_3.6.x86_64", "5Server:cups-1:1.3.7-8.el5_3.6.i386", "5Server:cups-1:1.3.7-8.el5_3.6.ia64", "5Server:cups-1:1.3.7-8.el5_3.6.ppc", "5Server:cups-1:1.3.7-8.el5_3.6.s390x", "5Server:cups-1:1.3.7-8.el5_3.6.src", "5Server:cups-1:1.3.7-8.el5_3.6.x86_64", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.i386", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.ia64", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.s390", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.s390x", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64", "5Server:cups-devel-1:1.3.7-8.el5_3.6.i386", "5Server:cups-devel-1:1.3.7-8.el5_3.6.ia64", "5Server:cups-devel-1:1.3.7-8.el5_3.6.ppc", "5Server:cups-devel-1:1.3.7-8.el5_3.6.ppc64", "5Server:cups-devel-1:1.3.7-8.el5_3.6.s390", "5Server:cups-devel-1:1.3.7-8.el5_3.6.s390x", "5Server:cups-devel-1:1.3.7-8.el5_3.6.x86_64", "5Server:cups-libs-1:1.3.7-8.el5_3.6.i386", "5Server:cups-libs-1:1.3.7-8.el5_3.6.ia64", "5Server:cups-libs-1:1.3.7-8.el5_3.6.ppc", "5Server:cups-libs-1:1.3.7-8.el5_3.6.ppc64", "5Server:cups-libs-1:1.3.7-8.el5_3.6.s390", "5Server:cups-libs-1:1.3.7-8.el5_3.6.s390x", "5Server:cups-libs-1:1.3.7-8.el5_3.6.x86_64", "5Server:cups-lpd-1:1.3.7-8.el5_3.6.i386", "5Server:cups-lpd-1:1.3.7-8.el5_3.6.ia64", "5Server:cups-lpd-1:1.3.7-8.el5_3.6.ppc", "5Server:cups-lpd-1:1.3.7-8.el5_3.6.s390x", "5Server:cups-lpd-1:1.3.7-8.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0949" }, { "category": "external", "summary": "RHBZ#500972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0949", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0949" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0949", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0949" } ], "release_date": "2009-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:34:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.i386", "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.ia64", "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.ppc", "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.s390x", "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.src", "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.i386", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.s390", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.i386", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.ia64", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.ppc", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.ppc64", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.s390", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.s390x", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.x86_64", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.i386", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.ia64", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.ppc", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.ppc64", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.s390", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.s390x", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.x86_64", "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.i386", "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.ia64", "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.ppc", "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.s390x", "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.x86_64", "5Client:cups-1:1.3.7-8.el5_3.6.i386", "5Client:cups-1:1.3.7-8.el5_3.6.ia64", "5Client:cups-1:1.3.7-8.el5_3.6.ppc", "5Client:cups-1:1.3.7-8.el5_3.6.s390x", "5Client:cups-1:1.3.7-8.el5_3.6.src", "5Client:cups-1:1.3.7-8.el5_3.6.x86_64", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.i386", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.ia64", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.s390", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.s390x", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64", "5Client:cups-devel-1:1.3.7-8.el5_3.6.i386", "5Client:cups-devel-1:1.3.7-8.el5_3.6.ia64", "5Client:cups-devel-1:1.3.7-8.el5_3.6.ppc", "5Client:cups-devel-1:1.3.7-8.el5_3.6.ppc64", "5Client:cups-devel-1:1.3.7-8.el5_3.6.s390", "5Client:cups-devel-1:1.3.7-8.el5_3.6.s390x", "5Client:cups-devel-1:1.3.7-8.el5_3.6.x86_64", "5Client:cups-libs-1:1.3.7-8.el5_3.6.i386", "5Client:cups-libs-1:1.3.7-8.el5_3.6.ia64", "5Client:cups-libs-1:1.3.7-8.el5_3.6.ppc", "5Client:cups-libs-1:1.3.7-8.el5_3.6.ppc64", "5Client:cups-libs-1:1.3.7-8.el5_3.6.s390", "5Client:cups-libs-1:1.3.7-8.el5_3.6.s390x", "5Client:cups-libs-1:1.3.7-8.el5_3.6.x86_64", "5Client:cups-lpd-1:1.3.7-8.el5_3.6.i386", "5Client:cups-lpd-1:1.3.7-8.el5_3.6.ia64", "5Client:cups-lpd-1:1.3.7-8.el5_3.6.ppc", "5Client:cups-lpd-1:1.3.7-8.el5_3.6.s390x", "5Client:cups-lpd-1:1.3.7-8.el5_3.6.x86_64", "5Server:cups-1:1.3.7-8.el5_3.6.i386", "5Server:cups-1:1.3.7-8.el5_3.6.ia64", "5Server:cups-1:1.3.7-8.el5_3.6.ppc", "5Server:cups-1:1.3.7-8.el5_3.6.s390x", "5Server:cups-1:1.3.7-8.el5_3.6.src", "5Server:cups-1:1.3.7-8.el5_3.6.x86_64", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.i386", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.ia64", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.s390", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.s390x", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64", "5Server:cups-devel-1:1.3.7-8.el5_3.6.i386", "5Server:cups-devel-1:1.3.7-8.el5_3.6.ia64", "5Server:cups-devel-1:1.3.7-8.el5_3.6.ppc", "5Server:cups-devel-1:1.3.7-8.el5_3.6.ppc64", "5Server:cups-devel-1:1.3.7-8.el5_3.6.s390", "5Server:cups-devel-1:1.3.7-8.el5_3.6.s390x", "5Server:cups-devel-1:1.3.7-8.el5_3.6.x86_64", "5Server:cups-libs-1:1.3.7-8.el5_3.6.i386", "5Server:cups-libs-1:1.3.7-8.el5_3.6.ia64", "5Server:cups-libs-1:1.3.7-8.el5_3.6.ppc", "5Server:cups-libs-1:1.3.7-8.el5_3.6.ppc64", "5Server:cups-libs-1:1.3.7-8.el5_3.6.s390", "5Server:cups-libs-1:1.3.7-8.el5_3.6.s390x", "5Server:cups-libs-1:1.3.7-8.el5_3.6.x86_64", "5Server:cups-lpd-1:1.3.7-8.el5_3.6.i386", "5Server:cups-lpd-1:1.3.7-8.el5_3.6.ia64", "5Server:cups-lpd-1:1.3.7-8.el5_3.6.ppc", "5Server:cups-lpd-1:1.3.7-8.el5_3.6.s390x", "5Server:cups-lpd-1:1.3.7-8.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1082" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.i386", "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.ia64", "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.ppc", "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.s390x", "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.src", "5Client-Workstation:cups-1:1.3.7-8.el5_3.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.i386", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.s390", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.i386", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.ia64", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.ppc", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.ppc64", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.s390", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.s390x", "5Client-Workstation:cups-devel-1:1.3.7-8.el5_3.6.x86_64", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.i386", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.ia64", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.ppc", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.ppc64", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.s390", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.s390x", "5Client-Workstation:cups-libs-1:1.3.7-8.el5_3.6.x86_64", "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.i386", "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.ia64", "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.ppc", "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.s390x", "5Client-Workstation:cups-lpd-1:1.3.7-8.el5_3.6.x86_64", "5Client:cups-1:1.3.7-8.el5_3.6.i386", "5Client:cups-1:1.3.7-8.el5_3.6.ia64", "5Client:cups-1:1.3.7-8.el5_3.6.ppc", "5Client:cups-1:1.3.7-8.el5_3.6.s390x", "5Client:cups-1:1.3.7-8.el5_3.6.src", "5Client:cups-1:1.3.7-8.el5_3.6.x86_64", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.i386", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.ia64", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.s390", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.s390x", "5Client:cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64", "5Client:cups-devel-1:1.3.7-8.el5_3.6.i386", "5Client:cups-devel-1:1.3.7-8.el5_3.6.ia64", "5Client:cups-devel-1:1.3.7-8.el5_3.6.ppc", "5Client:cups-devel-1:1.3.7-8.el5_3.6.ppc64", "5Client:cups-devel-1:1.3.7-8.el5_3.6.s390", "5Client:cups-devel-1:1.3.7-8.el5_3.6.s390x", "5Client:cups-devel-1:1.3.7-8.el5_3.6.x86_64", "5Client:cups-libs-1:1.3.7-8.el5_3.6.i386", "5Client:cups-libs-1:1.3.7-8.el5_3.6.ia64", "5Client:cups-libs-1:1.3.7-8.el5_3.6.ppc", "5Client:cups-libs-1:1.3.7-8.el5_3.6.ppc64", "5Client:cups-libs-1:1.3.7-8.el5_3.6.s390", "5Client:cups-libs-1:1.3.7-8.el5_3.6.s390x", "5Client:cups-libs-1:1.3.7-8.el5_3.6.x86_64", "5Client:cups-lpd-1:1.3.7-8.el5_3.6.i386", "5Client:cups-lpd-1:1.3.7-8.el5_3.6.ia64", "5Client:cups-lpd-1:1.3.7-8.el5_3.6.ppc", "5Client:cups-lpd-1:1.3.7-8.el5_3.6.s390x", "5Client:cups-lpd-1:1.3.7-8.el5_3.6.x86_64", "5Server:cups-1:1.3.7-8.el5_3.6.i386", "5Server:cups-1:1.3.7-8.el5_3.6.ia64", "5Server:cups-1:1.3.7-8.el5_3.6.ppc", "5Server:cups-1:1.3.7-8.el5_3.6.s390x", "5Server:cups-1:1.3.7-8.el5_3.6.src", "5Server:cups-1:1.3.7-8.el5_3.6.x86_64", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.i386", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.ia64", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.ppc64", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.s390", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.s390x", "5Server:cups-debuginfo-1:1.3.7-8.el5_3.6.x86_64", "5Server:cups-devel-1:1.3.7-8.el5_3.6.i386", "5Server:cups-devel-1:1.3.7-8.el5_3.6.ia64", "5Server:cups-devel-1:1.3.7-8.el5_3.6.ppc", "5Server:cups-devel-1:1.3.7-8.el5_3.6.ppc64", "5Server:cups-devel-1:1.3.7-8.el5_3.6.s390", "5Server:cups-devel-1:1.3.7-8.el5_3.6.s390x", "5Server:cups-devel-1:1.3.7-8.el5_3.6.x86_64", "5Server:cups-libs-1:1.3.7-8.el5_3.6.i386", "5Server:cups-libs-1:1.3.7-8.el5_3.6.ia64", "5Server:cups-libs-1:1.3.7-8.el5_3.6.ppc", "5Server:cups-libs-1:1.3.7-8.el5_3.6.ppc64", "5Server:cups-libs-1:1.3.7-8.el5_3.6.s390", "5Server:cups-libs-1:1.3.7-8.el5_3.6.s390x", "5Server:cups-libs-1:1.3.7-8.el5_3.6.x86_64", "5Server:cups-lpd-1:1.3.7-8.el5_3.6.i386", "5Server:cups-lpd-1:1.3.7-8.el5_3.6.ia64", "5Server:cups-lpd-1:1.3.7-8.el5_3.6.ppc", "5Server:cups-lpd-1:1.3.7-8.el5_3.6.s390x", "5Server:cups-lpd-1:1.3.7-8.el5_3.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups: IPP_TAG_UNSUPPORTED handling NULL pointer dereference DoS" } ] }
rhsa-2009_1083
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated cups packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 3 and 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Common UNIX\u00ae Printing System (CUPS) provides a portable printing layer\nfor UNIX operating systems. The Internet Printing Protocol (IPP) allows\nusers to print and manage printing-related tasks over a network. The CUPS\n\"pdftops\" filter converts Portable Document Format (PDF) files to\nPostScript. \"pdftops\" is based on Xpdf and the CUPS imaging library.\n\nA NULL pointer dereference flaw was found in the CUPS IPP routine, used for\nprocessing incoming IPP requests for the CUPS scheduler. An attacker could\nuse this flaw to send specially-crafted IPP requests that would crash the\ncupsd daemon. (CVE-2009-0949)\n\nA use-after-free flaw was found in the CUPS scheduler directory services\nroutine, used to process data about available printers and printer classes.\nAn attacker could use this flaw to cause a denial of service (cupsd daemon\nstop or crash). (CVE-2009-1196)\n\nMultiple integer overflows flaws, leading to heap-based buffer overflows,\nwere found in the CUPS \"pdftops\" filter. An attacker could create a\nmalicious PDF file that would cause \"pdftops\" to crash or, potentially,\nexecute arbitrary code as the \"lp\" user if the file was printed.\n(CVE-2009-0791)\n\nRed Hat would like to thank Anibal Sacco from Core Security Technologies\nfor reporting the CVE-2009-0949 flaw, and Swen van Brussel for reporting\nthe CVE-2009-1196 flaw.\n\nUsers of cups are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing this\nupdate, the cupsd daemon will be restarted automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1083", "url": "https://access.redhat.com/errata/RHSA-2009:1083" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "491840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491840" }, { "category": "external", "summary": "497135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497135" }, { "category": "external", "summary": "500972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500972" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1083.json" } ], "title": "Red Hat Security Advisory: cups security update", "tracking": { "current_release_date": "2024-11-22T03:03:52+00:00", "generator": { "date": "2024-11-22T03:03:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1083", "initial_release_date": "2009-06-03T15:48:00+00:00", "revision_history": [ { "date": "2009-06-03T15:48:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-06-03T11:50:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:03:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.62.ia64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.62.ia64", "product_id": "cups-debuginfo-1:1.1.17-13.3.62.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.62?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.62.ia64", "product": { "name": "cups-libs-1:1.1.17-13.3.62.ia64", "product_id": "cups-libs-1:1.1.17-13.3.62.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.62?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.62.ia64", "product": { "name": "cups-1:1.1.17-13.3.62.ia64", "product_id": "cups-1:1.1.17-13.3.62.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.62?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.62.ia64", "product": { "name": "cups-devel-1:1.1.17-13.3.62.ia64", "product_id": "cups-devel-1:1.1.17-13.3.62.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.62?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "product_id": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.32.el4_8.3?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.32.el4_8.3?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "product": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "product_id": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.32.el4_8.3?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "product_id": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.32.el4_8.3?arch=ia64\u0026epoch=1" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.62.i386", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.62.i386", "product_id": "cups-debuginfo-1:1.1.17-13.3.62.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.62?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.62.i386", "product": { "name": "cups-libs-1:1.1.17-13.3.62.i386", "product_id": "cups-libs-1:1.1.17-13.3.62.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.62?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.62.i386", "product": { "name": "cups-1:1.1.17-13.3.62.i386", "product_id": "cups-1:1.1.17-13.3.62.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.62?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.62.i386", "product": { "name": "cups-devel-1:1.1.17-13.3.62.i386", "product_id": "cups-devel-1:1.1.17-13.3.62.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.62?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.32.el4_8.3?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "product_id": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.32.el4_8.3?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "product_id": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.32.el4_8.3?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "product": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "product_id": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.32.el4_8.3?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.62.x86_64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.62.x86_64", "product_id": "cups-debuginfo-1:1.1.17-13.3.62.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.62?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.62.x86_64", "product": { "name": "cups-libs-1:1.1.17-13.3.62.x86_64", "product_id": "cups-libs-1:1.1.17-13.3.62.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.62?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.62.x86_64", "product": { "name": "cups-1:1.1.17-13.3.62.x86_64", "product_id": "cups-1:1.1.17-13.3.62.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.62?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.62.x86_64", "product": { "name": "cups-devel-1:1.1.17-13.3.62.x86_64", "product_id": "cups-devel-1:1.1.17-13.3.62.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.62?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "product_id": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.32.el4_8.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.32.el4_8.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "product": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "product_id": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.32.el4_8.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "product_id": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.32.el4_8.3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.62.src", "product": { "name": "cups-1:1.1.17-13.3.62.src", "product_id": "cups-1:1.1.17-13.3.62.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.62?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "product": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "product_id": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.32.el4_8.3?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.62.ppc64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.62.ppc64", "product_id": "cups-debuginfo-1:1.1.17-13.3.62.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.62?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.62.ppc64", "product": { "name": "cups-libs-1:1.1.17-13.3.62.ppc64", "product_id": "cups-libs-1:1.1.17-13.3.62.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.62?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.32.el4_8.3?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "product_id": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.32.el4_8.3?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.62.ppc", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.62.ppc", "product_id": "cups-debuginfo-1:1.1.17-13.3.62.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.62?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.62.ppc", "product": { "name": "cups-libs-1:1.1.17-13.3.62.ppc", "product_id": "cups-libs-1:1.1.17-13.3.62.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.62?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.62.ppc", "product": { "name": "cups-1:1.1.17-13.3.62.ppc", "product_id": "cups-1:1.1.17-13.3.62.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.62?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.62.ppc", "product": { "name": "cups-devel-1:1.1.17-13.3.62.ppc", "product_id": "cups-devel-1:1.1.17-13.3.62.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.62?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "product_id": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.32.el4_8.3?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.32.el4_8.3?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "product": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "product_id": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.32.el4_8.3?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "product_id": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.32.el4_8.3?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.62.s390x", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.62.s390x", "product_id": "cups-debuginfo-1:1.1.17-13.3.62.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.62?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.62.s390x", "product": { "name": "cups-libs-1:1.1.17-13.3.62.s390x", "product_id": "cups-libs-1:1.1.17-13.3.62.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.62?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.62.s390x", "product": { "name": "cups-1:1.1.17-13.3.62.s390x", "product_id": "cups-1:1.1.17-13.3.62.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.62?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.62.s390x", "product": { "name": "cups-devel-1:1.1.17-13.3.62.s390x", "product_id": "cups-devel-1:1.1.17-13.3.62.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.62?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "product_id": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.32.el4_8.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.32.el4_8.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "product": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "product_id": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.32.el4_8.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "product_id": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.32.el4_8.3?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.62.s390", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.62.s390", "product_id": "cups-debuginfo-1:1.1.17-13.3.62.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.62?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.62.s390", "product": { "name": "cups-libs-1:1.1.17-13.3.62.s390", "product_id": "cups-libs-1:1.1.17-13.3.62.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.62?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.62.s390", "product": { "name": "cups-1:1.1.17-13.3.62.s390", "product_id": "cups-1:1.1.17-13.3.62.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.62?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.62.s390", "product": { "name": "cups-devel-1:1.1.17-13.3.62.s390", "product_id": "cups-devel-1:1.1.17-13.3.62.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.62?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.32.el4_8.3?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "product_id": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.32.el4_8.3?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "product_id": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.32.el4_8.3?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "product": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "product_id": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.32.el4_8.3?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.62.src" }, "product_reference": "cups-1:1.1.17-13.3.62.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.62.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.62.src" }, "product_reference": "cups-1:1.1.17-13.3.62.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.62.src" }, "product_reference": "cups-1:1.1.17-13.3.62.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.62.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.62.src" }, "product_reference": "cups-1:1.1.17-13.3.62.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.62.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.62.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.62.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.62.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.62.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.62.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.62.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.62.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.62.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0791", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "491840" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops filter in CUPS 1.1.17, 1.1.22, and 1.3.7, GPdf, and kdegraphics KPDF, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file that triggers a heap-based buffer overflow, possibly related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: multiple integer overflows", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:cups-1:1.1.17-13.3.62.i386", "3AS:cups-1:1.1.17-13.3.62.ia64", "3AS:cups-1:1.1.17-13.3.62.ppc", "3AS:cups-1:1.1.17-13.3.62.s390", "3AS:cups-1:1.1.17-13.3.62.s390x", "3AS:cups-1:1.1.17-13.3.62.src", "3AS:cups-1:1.1.17-13.3.62.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3AS:cups-devel-1:1.1.17-13.3.62.i386", "3AS:cups-devel-1:1.1.17-13.3.62.ia64", "3AS:cups-devel-1:1.1.17-13.3.62.ppc", "3AS:cups-devel-1:1.1.17-13.3.62.s390", "3AS:cups-devel-1:1.1.17-13.3.62.s390x", "3AS:cups-devel-1:1.1.17-13.3.62.x86_64", "3AS:cups-libs-1:1.1.17-13.3.62.i386", "3AS:cups-libs-1:1.1.17-13.3.62.ia64", "3AS:cups-libs-1:1.1.17-13.3.62.ppc", "3AS:cups-libs-1:1.1.17-13.3.62.ppc64", "3AS:cups-libs-1:1.1.17-13.3.62.s390", "3AS:cups-libs-1:1.1.17-13.3.62.s390x", "3AS:cups-libs-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-1:1.1.17-13.3.62.i386", "3Desktop:cups-1:1.1.17-13.3.62.ia64", "3Desktop:cups-1:1.1.17-13.3.62.ppc", "3Desktop:cups-1:1.1.17-13.3.62.s390", "3Desktop:cups-1:1.1.17-13.3.62.s390x", "3Desktop:cups-1:1.1.17-13.3.62.src", "3Desktop:cups-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.62.i386", "3Desktop:cups-devel-1:1.1.17-13.3.62.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.62.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.62.i386", "3Desktop:cups-libs-1:1.1.17-13.3.62.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.62.x86_64", "3ES:cups-1:1.1.17-13.3.62.i386", "3ES:cups-1:1.1.17-13.3.62.ia64", "3ES:cups-1:1.1.17-13.3.62.ppc", "3ES:cups-1:1.1.17-13.3.62.s390", "3ES:cups-1:1.1.17-13.3.62.s390x", "3ES:cups-1:1.1.17-13.3.62.src", "3ES:cups-1:1.1.17-13.3.62.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3ES:cups-devel-1:1.1.17-13.3.62.i386", "3ES:cups-devel-1:1.1.17-13.3.62.ia64", "3ES:cups-devel-1:1.1.17-13.3.62.ppc", "3ES:cups-devel-1:1.1.17-13.3.62.s390", "3ES:cups-devel-1:1.1.17-13.3.62.s390x", "3ES:cups-devel-1:1.1.17-13.3.62.x86_64", "3ES:cups-libs-1:1.1.17-13.3.62.i386", "3ES:cups-libs-1:1.1.17-13.3.62.ia64", "3ES:cups-libs-1:1.1.17-13.3.62.ppc", "3ES:cups-libs-1:1.1.17-13.3.62.ppc64", "3ES:cups-libs-1:1.1.17-13.3.62.s390", "3ES:cups-libs-1:1.1.17-13.3.62.s390x", "3ES:cups-libs-1:1.1.17-13.3.62.x86_64", "3WS:cups-1:1.1.17-13.3.62.i386", "3WS:cups-1:1.1.17-13.3.62.ia64", "3WS:cups-1:1.1.17-13.3.62.ppc", "3WS:cups-1:1.1.17-13.3.62.s390", "3WS:cups-1:1.1.17-13.3.62.s390x", "3WS:cups-1:1.1.17-13.3.62.src", "3WS:cups-1:1.1.17-13.3.62.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3WS:cups-devel-1:1.1.17-13.3.62.i386", "3WS:cups-devel-1:1.1.17-13.3.62.ia64", "3WS:cups-devel-1:1.1.17-13.3.62.ppc", "3WS:cups-devel-1:1.1.17-13.3.62.s390", "3WS:cups-devel-1:1.1.17-13.3.62.s390x", "3WS:cups-devel-1:1.1.17-13.3.62.x86_64", "3WS:cups-libs-1:1.1.17-13.3.62.i386", "3WS:cups-libs-1:1.1.17-13.3.62.ia64", "3WS:cups-libs-1:1.1.17-13.3.62.ppc", "3WS:cups-libs-1:1.1.17-13.3.62.ppc64", "3WS:cups-libs-1:1.1.17-13.3.62.s390", "3WS:cups-libs-1:1.1.17-13.3.62.s390x", "3WS:cups-libs-1:1.1.17-13.3.62.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0791" }, { "category": "external", "summary": "RHBZ#491840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0791", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0791" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0791", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0791" } ], "release_date": "2009-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:48:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:cups-1:1.1.17-13.3.62.i386", "3AS:cups-1:1.1.17-13.3.62.ia64", "3AS:cups-1:1.1.17-13.3.62.ppc", "3AS:cups-1:1.1.17-13.3.62.s390", "3AS:cups-1:1.1.17-13.3.62.s390x", "3AS:cups-1:1.1.17-13.3.62.src", "3AS:cups-1:1.1.17-13.3.62.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3AS:cups-devel-1:1.1.17-13.3.62.i386", "3AS:cups-devel-1:1.1.17-13.3.62.ia64", "3AS:cups-devel-1:1.1.17-13.3.62.ppc", "3AS:cups-devel-1:1.1.17-13.3.62.s390", "3AS:cups-devel-1:1.1.17-13.3.62.s390x", "3AS:cups-devel-1:1.1.17-13.3.62.x86_64", "3AS:cups-libs-1:1.1.17-13.3.62.i386", "3AS:cups-libs-1:1.1.17-13.3.62.ia64", "3AS:cups-libs-1:1.1.17-13.3.62.ppc", "3AS:cups-libs-1:1.1.17-13.3.62.ppc64", "3AS:cups-libs-1:1.1.17-13.3.62.s390", "3AS:cups-libs-1:1.1.17-13.3.62.s390x", "3AS:cups-libs-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-1:1.1.17-13.3.62.i386", "3Desktop:cups-1:1.1.17-13.3.62.ia64", "3Desktop:cups-1:1.1.17-13.3.62.ppc", "3Desktop:cups-1:1.1.17-13.3.62.s390", "3Desktop:cups-1:1.1.17-13.3.62.s390x", "3Desktop:cups-1:1.1.17-13.3.62.src", "3Desktop:cups-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.62.i386", "3Desktop:cups-devel-1:1.1.17-13.3.62.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.62.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.62.i386", "3Desktop:cups-libs-1:1.1.17-13.3.62.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.62.x86_64", "3ES:cups-1:1.1.17-13.3.62.i386", "3ES:cups-1:1.1.17-13.3.62.ia64", "3ES:cups-1:1.1.17-13.3.62.ppc", "3ES:cups-1:1.1.17-13.3.62.s390", "3ES:cups-1:1.1.17-13.3.62.s390x", "3ES:cups-1:1.1.17-13.3.62.src", "3ES:cups-1:1.1.17-13.3.62.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3ES:cups-devel-1:1.1.17-13.3.62.i386", "3ES:cups-devel-1:1.1.17-13.3.62.ia64", "3ES:cups-devel-1:1.1.17-13.3.62.ppc", "3ES:cups-devel-1:1.1.17-13.3.62.s390", "3ES:cups-devel-1:1.1.17-13.3.62.s390x", "3ES:cups-devel-1:1.1.17-13.3.62.x86_64", "3ES:cups-libs-1:1.1.17-13.3.62.i386", "3ES:cups-libs-1:1.1.17-13.3.62.ia64", "3ES:cups-libs-1:1.1.17-13.3.62.ppc", "3ES:cups-libs-1:1.1.17-13.3.62.ppc64", "3ES:cups-libs-1:1.1.17-13.3.62.s390", "3ES:cups-libs-1:1.1.17-13.3.62.s390x", "3ES:cups-libs-1:1.1.17-13.3.62.x86_64", "3WS:cups-1:1.1.17-13.3.62.i386", "3WS:cups-1:1.1.17-13.3.62.ia64", "3WS:cups-1:1.1.17-13.3.62.ppc", "3WS:cups-1:1.1.17-13.3.62.s390", "3WS:cups-1:1.1.17-13.3.62.s390x", "3WS:cups-1:1.1.17-13.3.62.src", "3WS:cups-1:1.1.17-13.3.62.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3WS:cups-devel-1:1.1.17-13.3.62.i386", "3WS:cups-devel-1:1.1.17-13.3.62.ia64", "3WS:cups-devel-1:1.1.17-13.3.62.ppc", "3WS:cups-devel-1:1.1.17-13.3.62.s390", "3WS:cups-devel-1:1.1.17-13.3.62.s390x", "3WS:cups-devel-1:1.1.17-13.3.62.x86_64", "3WS:cups-libs-1:1.1.17-13.3.62.i386", "3WS:cups-libs-1:1.1.17-13.3.62.ia64", "3WS:cups-libs-1:1.1.17-13.3.62.ppc", "3WS:cups-libs-1:1.1.17-13.3.62.ppc64", "3WS:cups-libs-1:1.1.17-13.3.62.s390", "3WS:cups-libs-1:1.1.17-13.3.62.s390x", "3WS:cups-libs-1:1.1.17-13.3.62.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1083" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "3AS:cups-1:1.1.17-13.3.62.i386", "3AS:cups-1:1.1.17-13.3.62.ia64", "3AS:cups-1:1.1.17-13.3.62.ppc", "3AS:cups-1:1.1.17-13.3.62.s390", "3AS:cups-1:1.1.17-13.3.62.s390x", "3AS:cups-1:1.1.17-13.3.62.src", "3AS:cups-1:1.1.17-13.3.62.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3AS:cups-devel-1:1.1.17-13.3.62.i386", "3AS:cups-devel-1:1.1.17-13.3.62.ia64", "3AS:cups-devel-1:1.1.17-13.3.62.ppc", "3AS:cups-devel-1:1.1.17-13.3.62.s390", "3AS:cups-devel-1:1.1.17-13.3.62.s390x", "3AS:cups-devel-1:1.1.17-13.3.62.x86_64", "3AS:cups-libs-1:1.1.17-13.3.62.i386", "3AS:cups-libs-1:1.1.17-13.3.62.ia64", "3AS:cups-libs-1:1.1.17-13.3.62.ppc", "3AS:cups-libs-1:1.1.17-13.3.62.ppc64", "3AS:cups-libs-1:1.1.17-13.3.62.s390", "3AS:cups-libs-1:1.1.17-13.3.62.s390x", "3AS:cups-libs-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-1:1.1.17-13.3.62.i386", "3Desktop:cups-1:1.1.17-13.3.62.ia64", "3Desktop:cups-1:1.1.17-13.3.62.ppc", "3Desktop:cups-1:1.1.17-13.3.62.s390", "3Desktop:cups-1:1.1.17-13.3.62.s390x", "3Desktop:cups-1:1.1.17-13.3.62.src", "3Desktop:cups-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.62.i386", "3Desktop:cups-devel-1:1.1.17-13.3.62.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.62.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.62.i386", "3Desktop:cups-libs-1:1.1.17-13.3.62.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.62.x86_64", "3ES:cups-1:1.1.17-13.3.62.i386", "3ES:cups-1:1.1.17-13.3.62.ia64", "3ES:cups-1:1.1.17-13.3.62.ppc", "3ES:cups-1:1.1.17-13.3.62.s390", "3ES:cups-1:1.1.17-13.3.62.s390x", "3ES:cups-1:1.1.17-13.3.62.src", "3ES:cups-1:1.1.17-13.3.62.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3ES:cups-devel-1:1.1.17-13.3.62.i386", "3ES:cups-devel-1:1.1.17-13.3.62.ia64", "3ES:cups-devel-1:1.1.17-13.3.62.ppc", "3ES:cups-devel-1:1.1.17-13.3.62.s390", "3ES:cups-devel-1:1.1.17-13.3.62.s390x", "3ES:cups-devel-1:1.1.17-13.3.62.x86_64", "3ES:cups-libs-1:1.1.17-13.3.62.i386", "3ES:cups-libs-1:1.1.17-13.3.62.ia64", "3ES:cups-libs-1:1.1.17-13.3.62.ppc", "3ES:cups-libs-1:1.1.17-13.3.62.ppc64", "3ES:cups-libs-1:1.1.17-13.3.62.s390", "3ES:cups-libs-1:1.1.17-13.3.62.s390x", "3ES:cups-libs-1:1.1.17-13.3.62.x86_64", "3WS:cups-1:1.1.17-13.3.62.i386", "3WS:cups-1:1.1.17-13.3.62.ia64", "3WS:cups-1:1.1.17-13.3.62.ppc", "3WS:cups-1:1.1.17-13.3.62.s390", "3WS:cups-1:1.1.17-13.3.62.s390x", "3WS:cups-1:1.1.17-13.3.62.src", "3WS:cups-1:1.1.17-13.3.62.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3WS:cups-devel-1:1.1.17-13.3.62.i386", "3WS:cups-devel-1:1.1.17-13.3.62.ia64", "3WS:cups-devel-1:1.1.17-13.3.62.ppc", "3WS:cups-devel-1:1.1.17-13.3.62.s390", "3WS:cups-devel-1:1.1.17-13.3.62.s390x", "3WS:cups-devel-1:1.1.17-13.3.62.x86_64", "3WS:cups-libs-1:1.1.17-13.3.62.i386", "3WS:cups-libs-1:1.1.17-13.3.62.ia64", "3WS:cups-libs-1:1.1.17-13.3.62.ppc", "3WS:cups-libs-1:1.1.17-13.3.62.ppc64", "3WS:cups-libs-1:1.1.17-13.3.62.s390", "3WS:cups-libs-1:1.1.17-13.3.62.s390x", "3WS:cups-libs-1:1.1.17-13.3.62.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xpdf: multiple integer overflows" }, { "acknowledgments": [ { "names": [ "Anibal Sacco" ], "organization": "Core Security Technologies" } ], "cve": "CVE-2009-0949", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2009-05-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "500972" } ], "notes": [ { "category": "description", "text": "The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: IPP_TAG_UNSUPPORTED handling NULL pointer dereference DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:cups-1:1.1.17-13.3.62.i386", "3AS:cups-1:1.1.17-13.3.62.ia64", "3AS:cups-1:1.1.17-13.3.62.ppc", "3AS:cups-1:1.1.17-13.3.62.s390", "3AS:cups-1:1.1.17-13.3.62.s390x", "3AS:cups-1:1.1.17-13.3.62.src", "3AS:cups-1:1.1.17-13.3.62.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3AS:cups-devel-1:1.1.17-13.3.62.i386", "3AS:cups-devel-1:1.1.17-13.3.62.ia64", "3AS:cups-devel-1:1.1.17-13.3.62.ppc", "3AS:cups-devel-1:1.1.17-13.3.62.s390", "3AS:cups-devel-1:1.1.17-13.3.62.s390x", "3AS:cups-devel-1:1.1.17-13.3.62.x86_64", "3AS:cups-libs-1:1.1.17-13.3.62.i386", "3AS:cups-libs-1:1.1.17-13.3.62.ia64", "3AS:cups-libs-1:1.1.17-13.3.62.ppc", "3AS:cups-libs-1:1.1.17-13.3.62.ppc64", "3AS:cups-libs-1:1.1.17-13.3.62.s390", "3AS:cups-libs-1:1.1.17-13.3.62.s390x", "3AS:cups-libs-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-1:1.1.17-13.3.62.i386", "3Desktop:cups-1:1.1.17-13.3.62.ia64", "3Desktop:cups-1:1.1.17-13.3.62.ppc", "3Desktop:cups-1:1.1.17-13.3.62.s390", "3Desktop:cups-1:1.1.17-13.3.62.s390x", "3Desktop:cups-1:1.1.17-13.3.62.src", "3Desktop:cups-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.62.i386", "3Desktop:cups-devel-1:1.1.17-13.3.62.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.62.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.62.i386", "3Desktop:cups-libs-1:1.1.17-13.3.62.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.62.x86_64", "3ES:cups-1:1.1.17-13.3.62.i386", "3ES:cups-1:1.1.17-13.3.62.ia64", "3ES:cups-1:1.1.17-13.3.62.ppc", "3ES:cups-1:1.1.17-13.3.62.s390", "3ES:cups-1:1.1.17-13.3.62.s390x", "3ES:cups-1:1.1.17-13.3.62.src", "3ES:cups-1:1.1.17-13.3.62.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3ES:cups-devel-1:1.1.17-13.3.62.i386", "3ES:cups-devel-1:1.1.17-13.3.62.ia64", "3ES:cups-devel-1:1.1.17-13.3.62.ppc", "3ES:cups-devel-1:1.1.17-13.3.62.s390", "3ES:cups-devel-1:1.1.17-13.3.62.s390x", "3ES:cups-devel-1:1.1.17-13.3.62.x86_64", "3ES:cups-libs-1:1.1.17-13.3.62.i386", "3ES:cups-libs-1:1.1.17-13.3.62.ia64", "3ES:cups-libs-1:1.1.17-13.3.62.ppc", "3ES:cups-libs-1:1.1.17-13.3.62.ppc64", "3ES:cups-libs-1:1.1.17-13.3.62.s390", "3ES:cups-libs-1:1.1.17-13.3.62.s390x", "3ES:cups-libs-1:1.1.17-13.3.62.x86_64", "3WS:cups-1:1.1.17-13.3.62.i386", "3WS:cups-1:1.1.17-13.3.62.ia64", "3WS:cups-1:1.1.17-13.3.62.ppc", "3WS:cups-1:1.1.17-13.3.62.s390", "3WS:cups-1:1.1.17-13.3.62.s390x", "3WS:cups-1:1.1.17-13.3.62.src", "3WS:cups-1:1.1.17-13.3.62.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3WS:cups-devel-1:1.1.17-13.3.62.i386", "3WS:cups-devel-1:1.1.17-13.3.62.ia64", "3WS:cups-devel-1:1.1.17-13.3.62.ppc", "3WS:cups-devel-1:1.1.17-13.3.62.s390", "3WS:cups-devel-1:1.1.17-13.3.62.s390x", "3WS:cups-devel-1:1.1.17-13.3.62.x86_64", "3WS:cups-libs-1:1.1.17-13.3.62.i386", "3WS:cups-libs-1:1.1.17-13.3.62.ia64", "3WS:cups-libs-1:1.1.17-13.3.62.ppc", "3WS:cups-libs-1:1.1.17-13.3.62.ppc64", "3WS:cups-libs-1:1.1.17-13.3.62.s390", "3WS:cups-libs-1:1.1.17-13.3.62.s390x", "3WS:cups-libs-1:1.1.17-13.3.62.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0949" }, { "category": "external", "summary": "RHBZ#500972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0949", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0949" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0949", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0949" } ], "release_date": "2009-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:48:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:cups-1:1.1.17-13.3.62.i386", "3AS:cups-1:1.1.17-13.3.62.ia64", "3AS:cups-1:1.1.17-13.3.62.ppc", "3AS:cups-1:1.1.17-13.3.62.s390", "3AS:cups-1:1.1.17-13.3.62.s390x", "3AS:cups-1:1.1.17-13.3.62.src", "3AS:cups-1:1.1.17-13.3.62.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3AS:cups-devel-1:1.1.17-13.3.62.i386", "3AS:cups-devel-1:1.1.17-13.3.62.ia64", "3AS:cups-devel-1:1.1.17-13.3.62.ppc", "3AS:cups-devel-1:1.1.17-13.3.62.s390", "3AS:cups-devel-1:1.1.17-13.3.62.s390x", "3AS:cups-devel-1:1.1.17-13.3.62.x86_64", "3AS:cups-libs-1:1.1.17-13.3.62.i386", "3AS:cups-libs-1:1.1.17-13.3.62.ia64", "3AS:cups-libs-1:1.1.17-13.3.62.ppc", "3AS:cups-libs-1:1.1.17-13.3.62.ppc64", "3AS:cups-libs-1:1.1.17-13.3.62.s390", "3AS:cups-libs-1:1.1.17-13.3.62.s390x", "3AS:cups-libs-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-1:1.1.17-13.3.62.i386", "3Desktop:cups-1:1.1.17-13.3.62.ia64", "3Desktop:cups-1:1.1.17-13.3.62.ppc", "3Desktop:cups-1:1.1.17-13.3.62.s390", "3Desktop:cups-1:1.1.17-13.3.62.s390x", "3Desktop:cups-1:1.1.17-13.3.62.src", "3Desktop:cups-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.62.i386", "3Desktop:cups-devel-1:1.1.17-13.3.62.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.62.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.62.i386", "3Desktop:cups-libs-1:1.1.17-13.3.62.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.62.x86_64", "3ES:cups-1:1.1.17-13.3.62.i386", "3ES:cups-1:1.1.17-13.3.62.ia64", "3ES:cups-1:1.1.17-13.3.62.ppc", "3ES:cups-1:1.1.17-13.3.62.s390", "3ES:cups-1:1.1.17-13.3.62.s390x", "3ES:cups-1:1.1.17-13.3.62.src", "3ES:cups-1:1.1.17-13.3.62.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3ES:cups-devel-1:1.1.17-13.3.62.i386", "3ES:cups-devel-1:1.1.17-13.3.62.ia64", "3ES:cups-devel-1:1.1.17-13.3.62.ppc", "3ES:cups-devel-1:1.1.17-13.3.62.s390", "3ES:cups-devel-1:1.1.17-13.3.62.s390x", "3ES:cups-devel-1:1.1.17-13.3.62.x86_64", "3ES:cups-libs-1:1.1.17-13.3.62.i386", "3ES:cups-libs-1:1.1.17-13.3.62.ia64", "3ES:cups-libs-1:1.1.17-13.3.62.ppc", "3ES:cups-libs-1:1.1.17-13.3.62.ppc64", "3ES:cups-libs-1:1.1.17-13.3.62.s390", "3ES:cups-libs-1:1.1.17-13.3.62.s390x", "3ES:cups-libs-1:1.1.17-13.3.62.x86_64", "3WS:cups-1:1.1.17-13.3.62.i386", "3WS:cups-1:1.1.17-13.3.62.ia64", "3WS:cups-1:1.1.17-13.3.62.ppc", "3WS:cups-1:1.1.17-13.3.62.s390", "3WS:cups-1:1.1.17-13.3.62.s390x", "3WS:cups-1:1.1.17-13.3.62.src", "3WS:cups-1:1.1.17-13.3.62.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3WS:cups-devel-1:1.1.17-13.3.62.i386", "3WS:cups-devel-1:1.1.17-13.3.62.ia64", "3WS:cups-devel-1:1.1.17-13.3.62.ppc", "3WS:cups-devel-1:1.1.17-13.3.62.s390", "3WS:cups-devel-1:1.1.17-13.3.62.s390x", "3WS:cups-devel-1:1.1.17-13.3.62.x86_64", "3WS:cups-libs-1:1.1.17-13.3.62.i386", "3WS:cups-libs-1:1.1.17-13.3.62.ia64", "3WS:cups-libs-1:1.1.17-13.3.62.ppc", "3WS:cups-libs-1:1.1.17-13.3.62.ppc64", "3WS:cups-libs-1:1.1.17-13.3.62.s390", "3WS:cups-libs-1:1.1.17-13.3.62.s390x", "3WS:cups-libs-1:1.1.17-13.3.62.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1083" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "3AS:cups-1:1.1.17-13.3.62.i386", "3AS:cups-1:1.1.17-13.3.62.ia64", "3AS:cups-1:1.1.17-13.3.62.ppc", "3AS:cups-1:1.1.17-13.3.62.s390", "3AS:cups-1:1.1.17-13.3.62.s390x", "3AS:cups-1:1.1.17-13.3.62.src", "3AS:cups-1:1.1.17-13.3.62.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3AS:cups-devel-1:1.1.17-13.3.62.i386", "3AS:cups-devel-1:1.1.17-13.3.62.ia64", "3AS:cups-devel-1:1.1.17-13.3.62.ppc", "3AS:cups-devel-1:1.1.17-13.3.62.s390", "3AS:cups-devel-1:1.1.17-13.3.62.s390x", "3AS:cups-devel-1:1.1.17-13.3.62.x86_64", "3AS:cups-libs-1:1.1.17-13.3.62.i386", "3AS:cups-libs-1:1.1.17-13.3.62.ia64", "3AS:cups-libs-1:1.1.17-13.3.62.ppc", "3AS:cups-libs-1:1.1.17-13.3.62.ppc64", "3AS:cups-libs-1:1.1.17-13.3.62.s390", "3AS:cups-libs-1:1.1.17-13.3.62.s390x", "3AS:cups-libs-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-1:1.1.17-13.3.62.i386", "3Desktop:cups-1:1.1.17-13.3.62.ia64", "3Desktop:cups-1:1.1.17-13.3.62.ppc", "3Desktop:cups-1:1.1.17-13.3.62.s390", "3Desktop:cups-1:1.1.17-13.3.62.s390x", "3Desktop:cups-1:1.1.17-13.3.62.src", "3Desktop:cups-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.62.i386", "3Desktop:cups-devel-1:1.1.17-13.3.62.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.62.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.62.i386", "3Desktop:cups-libs-1:1.1.17-13.3.62.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.62.x86_64", "3ES:cups-1:1.1.17-13.3.62.i386", "3ES:cups-1:1.1.17-13.3.62.ia64", "3ES:cups-1:1.1.17-13.3.62.ppc", "3ES:cups-1:1.1.17-13.3.62.s390", "3ES:cups-1:1.1.17-13.3.62.s390x", "3ES:cups-1:1.1.17-13.3.62.src", "3ES:cups-1:1.1.17-13.3.62.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3ES:cups-devel-1:1.1.17-13.3.62.i386", "3ES:cups-devel-1:1.1.17-13.3.62.ia64", "3ES:cups-devel-1:1.1.17-13.3.62.ppc", "3ES:cups-devel-1:1.1.17-13.3.62.s390", "3ES:cups-devel-1:1.1.17-13.3.62.s390x", "3ES:cups-devel-1:1.1.17-13.3.62.x86_64", "3ES:cups-libs-1:1.1.17-13.3.62.i386", "3ES:cups-libs-1:1.1.17-13.3.62.ia64", "3ES:cups-libs-1:1.1.17-13.3.62.ppc", "3ES:cups-libs-1:1.1.17-13.3.62.ppc64", "3ES:cups-libs-1:1.1.17-13.3.62.s390", "3ES:cups-libs-1:1.1.17-13.3.62.s390x", "3ES:cups-libs-1:1.1.17-13.3.62.x86_64", "3WS:cups-1:1.1.17-13.3.62.i386", "3WS:cups-1:1.1.17-13.3.62.ia64", "3WS:cups-1:1.1.17-13.3.62.ppc", "3WS:cups-1:1.1.17-13.3.62.s390", "3WS:cups-1:1.1.17-13.3.62.s390x", "3WS:cups-1:1.1.17-13.3.62.src", "3WS:cups-1:1.1.17-13.3.62.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3WS:cups-devel-1:1.1.17-13.3.62.i386", "3WS:cups-devel-1:1.1.17-13.3.62.ia64", "3WS:cups-devel-1:1.1.17-13.3.62.ppc", "3WS:cups-devel-1:1.1.17-13.3.62.s390", "3WS:cups-devel-1:1.1.17-13.3.62.s390x", "3WS:cups-devel-1:1.1.17-13.3.62.x86_64", "3WS:cups-libs-1:1.1.17-13.3.62.i386", "3WS:cups-libs-1:1.1.17-13.3.62.ia64", "3WS:cups-libs-1:1.1.17-13.3.62.ppc", "3WS:cups-libs-1:1.1.17-13.3.62.ppc64", "3WS:cups-libs-1:1.1.17-13.3.62.s390", "3WS:cups-libs-1:1.1.17-13.3.62.s390x", "3WS:cups-libs-1:1.1.17-13.3.62.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups: IPP_TAG_UNSUPPORTED handling NULL pointer dereference DoS" }, { "acknowledgments": [ { "names": [ "Swen van Brussel" ] } ], "cve": "CVE-2009-1196", "discovery_date": "2009-04-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "497135" } ], "notes": [ { "category": "description", "text": "The directory-services functionality in the scheduler in CUPS 1.1.17 and 1.1.22 allows remote attackers to cause a denial of service (cupsd daemon outage or crash) via manipulations of the timing of CUPS browse packets, related to a \"pointer use-after-delete flaw.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: DoS (stop, crash) by renewing CUPS browse packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:cups-1:1.1.17-13.3.62.i386", "3AS:cups-1:1.1.17-13.3.62.ia64", "3AS:cups-1:1.1.17-13.3.62.ppc", "3AS:cups-1:1.1.17-13.3.62.s390", "3AS:cups-1:1.1.17-13.3.62.s390x", "3AS:cups-1:1.1.17-13.3.62.src", "3AS:cups-1:1.1.17-13.3.62.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3AS:cups-devel-1:1.1.17-13.3.62.i386", "3AS:cups-devel-1:1.1.17-13.3.62.ia64", "3AS:cups-devel-1:1.1.17-13.3.62.ppc", "3AS:cups-devel-1:1.1.17-13.3.62.s390", "3AS:cups-devel-1:1.1.17-13.3.62.s390x", "3AS:cups-devel-1:1.1.17-13.3.62.x86_64", "3AS:cups-libs-1:1.1.17-13.3.62.i386", "3AS:cups-libs-1:1.1.17-13.3.62.ia64", "3AS:cups-libs-1:1.1.17-13.3.62.ppc", "3AS:cups-libs-1:1.1.17-13.3.62.ppc64", "3AS:cups-libs-1:1.1.17-13.3.62.s390", "3AS:cups-libs-1:1.1.17-13.3.62.s390x", "3AS:cups-libs-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-1:1.1.17-13.3.62.i386", "3Desktop:cups-1:1.1.17-13.3.62.ia64", "3Desktop:cups-1:1.1.17-13.3.62.ppc", "3Desktop:cups-1:1.1.17-13.3.62.s390", "3Desktop:cups-1:1.1.17-13.3.62.s390x", "3Desktop:cups-1:1.1.17-13.3.62.src", "3Desktop:cups-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.62.i386", "3Desktop:cups-devel-1:1.1.17-13.3.62.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.62.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.62.i386", "3Desktop:cups-libs-1:1.1.17-13.3.62.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.62.x86_64", "3ES:cups-1:1.1.17-13.3.62.i386", "3ES:cups-1:1.1.17-13.3.62.ia64", "3ES:cups-1:1.1.17-13.3.62.ppc", "3ES:cups-1:1.1.17-13.3.62.s390", "3ES:cups-1:1.1.17-13.3.62.s390x", "3ES:cups-1:1.1.17-13.3.62.src", "3ES:cups-1:1.1.17-13.3.62.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3ES:cups-devel-1:1.1.17-13.3.62.i386", "3ES:cups-devel-1:1.1.17-13.3.62.ia64", "3ES:cups-devel-1:1.1.17-13.3.62.ppc", "3ES:cups-devel-1:1.1.17-13.3.62.s390", "3ES:cups-devel-1:1.1.17-13.3.62.s390x", "3ES:cups-devel-1:1.1.17-13.3.62.x86_64", "3ES:cups-libs-1:1.1.17-13.3.62.i386", "3ES:cups-libs-1:1.1.17-13.3.62.ia64", "3ES:cups-libs-1:1.1.17-13.3.62.ppc", "3ES:cups-libs-1:1.1.17-13.3.62.ppc64", "3ES:cups-libs-1:1.1.17-13.3.62.s390", "3ES:cups-libs-1:1.1.17-13.3.62.s390x", "3ES:cups-libs-1:1.1.17-13.3.62.x86_64", "3WS:cups-1:1.1.17-13.3.62.i386", "3WS:cups-1:1.1.17-13.3.62.ia64", "3WS:cups-1:1.1.17-13.3.62.ppc", "3WS:cups-1:1.1.17-13.3.62.s390", "3WS:cups-1:1.1.17-13.3.62.s390x", "3WS:cups-1:1.1.17-13.3.62.src", "3WS:cups-1:1.1.17-13.3.62.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3WS:cups-devel-1:1.1.17-13.3.62.i386", "3WS:cups-devel-1:1.1.17-13.3.62.ia64", "3WS:cups-devel-1:1.1.17-13.3.62.ppc", "3WS:cups-devel-1:1.1.17-13.3.62.s390", "3WS:cups-devel-1:1.1.17-13.3.62.s390x", "3WS:cups-devel-1:1.1.17-13.3.62.x86_64", "3WS:cups-libs-1:1.1.17-13.3.62.i386", "3WS:cups-libs-1:1.1.17-13.3.62.ia64", "3WS:cups-libs-1:1.1.17-13.3.62.ppc", "3WS:cups-libs-1:1.1.17-13.3.62.ppc64", "3WS:cups-libs-1:1.1.17-13.3.62.s390", "3WS:cups-libs-1:1.1.17-13.3.62.s390x", "3WS:cups-libs-1:1.1.17-13.3.62.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1196" }, { "category": "external", "summary": "RHBZ#497135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1196", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1196" } ], "release_date": "2009-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-03T15:48:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:cups-1:1.1.17-13.3.62.i386", "3AS:cups-1:1.1.17-13.3.62.ia64", "3AS:cups-1:1.1.17-13.3.62.ppc", "3AS:cups-1:1.1.17-13.3.62.s390", "3AS:cups-1:1.1.17-13.3.62.s390x", "3AS:cups-1:1.1.17-13.3.62.src", "3AS:cups-1:1.1.17-13.3.62.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3AS:cups-devel-1:1.1.17-13.3.62.i386", "3AS:cups-devel-1:1.1.17-13.3.62.ia64", "3AS:cups-devel-1:1.1.17-13.3.62.ppc", "3AS:cups-devel-1:1.1.17-13.3.62.s390", "3AS:cups-devel-1:1.1.17-13.3.62.s390x", "3AS:cups-devel-1:1.1.17-13.3.62.x86_64", "3AS:cups-libs-1:1.1.17-13.3.62.i386", "3AS:cups-libs-1:1.1.17-13.3.62.ia64", "3AS:cups-libs-1:1.1.17-13.3.62.ppc", "3AS:cups-libs-1:1.1.17-13.3.62.ppc64", "3AS:cups-libs-1:1.1.17-13.3.62.s390", "3AS:cups-libs-1:1.1.17-13.3.62.s390x", "3AS:cups-libs-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-1:1.1.17-13.3.62.i386", "3Desktop:cups-1:1.1.17-13.3.62.ia64", "3Desktop:cups-1:1.1.17-13.3.62.ppc", "3Desktop:cups-1:1.1.17-13.3.62.s390", "3Desktop:cups-1:1.1.17-13.3.62.s390x", "3Desktop:cups-1:1.1.17-13.3.62.src", "3Desktop:cups-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.62.i386", "3Desktop:cups-devel-1:1.1.17-13.3.62.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.62.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.62.i386", "3Desktop:cups-libs-1:1.1.17-13.3.62.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.62.x86_64", "3ES:cups-1:1.1.17-13.3.62.i386", "3ES:cups-1:1.1.17-13.3.62.ia64", "3ES:cups-1:1.1.17-13.3.62.ppc", "3ES:cups-1:1.1.17-13.3.62.s390", "3ES:cups-1:1.1.17-13.3.62.s390x", "3ES:cups-1:1.1.17-13.3.62.src", "3ES:cups-1:1.1.17-13.3.62.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3ES:cups-devel-1:1.1.17-13.3.62.i386", "3ES:cups-devel-1:1.1.17-13.3.62.ia64", "3ES:cups-devel-1:1.1.17-13.3.62.ppc", "3ES:cups-devel-1:1.1.17-13.3.62.s390", "3ES:cups-devel-1:1.1.17-13.3.62.s390x", "3ES:cups-devel-1:1.1.17-13.3.62.x86_64", "3ES:cups-libs-1:1.1.17-13.3.62.i386", "3ES:cups-libs-1:1.1.17-13.3.62.ia64", "3ES:cups-libs-1:1.1.17-13.3.62.ppc", "3ES:cups-libs-1:1.1.17-13.3.62.ppc64", "3ES:cups-libs-1:1.1.17-13.3.62.s390", "3ES:cups-libs-1:1.1.17-13.3.62.s390x", "3ES:cups-libs-1:1.1.17-13.3.62.x86_64", "3WS:cups-1:1.1.17-13.3.62.i386", "3WS:cups-1:1.1.17-13.3.62.ia64", "3WS:cups-1:1.1.17-13.3.62.ppc", "3WS:cups-1:1.1.17-13.3.62.s390", "3WS:cups-1:1.1.17-13.3.62.s390x", "3WS:cups-1:1.1.17-13.3.62.src", "3WS:cups-1:1.1.17-13.3.62.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3WS:cups-devel-1:1.1.17-13.3.62.i386", "3WS:cups-devel-1:1.1.17-13.3.62.ia64", "3WS:cups-devel-1:1.1.17-13.3.62.ppc", "3WS:cups-devel-1:1.1.17-13.3.62.s390", "3WS:cups-devel-1:1.1.17-13.3.62.s390x", "3WS:cups-devel-1:1.1.17-13.3.62.x86_64", "3WS:cups-libs-1:1.1.17-13.3.62.i386", "3WS:cups-libs-1:1.1.17-13.3.62.ia64", "3WS:cups-libs-1:1.1.17-13.3.62.ppc", "3WS:cups-libs-1:1.1.17-13.3.62.ppc64", "3WS:cups-libs-1:1.1.17-13.3.62.s390", "3WS:cups-libs-1:1.1.17-13.3.62.s390x", "3WS:cups-libs-1:1.1.17-13.3.62.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1083" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "3AS:cups-1:1.1.17-13.3.62.i386", "3AS:cups-1:1.1.17-13.3.62.ia64", "3AS:cups-1:1.1.17-13.3.62.ppc", "3AS:cups-1:1.1.17-13.3.62.s390", "3AS:cups-1:1.1.17-13.3.62.s390x", "3AS:cups-1:1.1.17-13.3.62.src", "3AS:cups-1:1.1.17-13.3.62.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3AS:cups-devel-1:1.1.17-13.3.62.i386", "3AS:cups-devel-1:1.1.17-13.3.62.ia64", "3AS:cups-devel-1:1.1.17-13.3.62.ppc", "3AS:cups-devel-1:1.1.17-13.3.62.s390", "3AS:cups-devel-1:1.1.17-13.3.62.s390x", "3AS:cups-devel-1:1.1.17-13.3.62.x86_64", "3AS:cups-libs-1:1.1.17-13.3.62.i386", "3AS:cups-libs-1:1.1.17-13.3.62.ia64", "3AS:cups-libs-1:1.1.17-13.3.62.ppc", "3AS:cups-libs-1:1.1.17-13.3.62.ppc64", "3AS:cups-libs-1:1.1.17-13.3.62.s390", "3AS:cups-libs-1:1.1.17-13.3.62.s390x", "3AS:cups-libs-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-1:1.1.17-13.3.62.i386", "3Desktop:cups-1:1.1.17-13.3.62.ia64", "3Desktop:cups-1:1.1.17-13.3.62.ppc", "3Desktop:cups-1:1.1.17-13.3.62.s390", "3Desktop:cups-1:1.1.17-13.3.62.s390x", "3Desktop:cups-1:1.1.17-13.3.62.src", "3Desktop:cups-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.62.i386", "3Desktop:cups-devel-1:1.1.17-13.3.62.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.62.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390", "3Desktop:cups-devel-1:1.1.17-13.3.62.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.62.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.62.i386", "3Desktop:cups-libs-1:1.1.17-13.3.62.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.62.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390", "3Desktop:cups-libs-1:1.1.17-13.3.62.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.62.x86_64", "3ES:cups-1:1.1.17-13.3.62.i386", "3ES:cups-1:1.1.17-13.3.62.ia64", "3ES:cups-1:1.1.17-13.3.62.ppc", "3ES:cups-1:1.1.17-13.3.62.s390", "3ES:cups-1:1.1.17-13.3.62.s390x", "3ES:cups-1:1.1.17-13.3.62.src", "3ES:cups-1:1.1.17-13.3.62.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3ES:cups-devel-1:1.1.17-13.3.62.i386", "3ES:cups-devel-1:1.1.17-13.3.62.ia64", "3ES:cups-devel-1:1.1.17-13.3.62.ppc", "3ES:cups-devel-1:1.1.17-13.3.62.s390", "3ES:cups-devel-1:1.1.17-13.3.62.s390x", "3ES:cups-devel-1:1.1.17-13.3.62.x86_64", "3ES:cups-libs-1:1.1.17-13.3.62.i386", "3ES:cups-libs-1:1.1.17-13.3.62.ia64", "3ES:cups-libs-1:1.1.17-13.3.62.ppc", "3ES:cups-libs-1:1.1.17-13.3.62.ppc64", "3ES:cups-libs-1:1.1.17-13.3.62.s390", "3ES:cups-libs-1:1.1.17-13.3.62.s390x", "3ES:cups-libs-1:1.1.17-13.3.62.x86_64", "3WS:cups-1:1.1.17-13.3.62.i386", "3WS:cups-1:1.1.17-13.3.62.ia64", "3WS:cups-1:1.1.17-13.3.62.ppc", "3WS:cups-1:1.1.17-13.3.62.s390", "3WS:cups-1:1.1.17-13.3.62.s390x", "3WS:cups-1:1.1.17-13.3.62.src", "3WS:cups-1:1.1.17-13.3.62.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.62.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.62.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.62.x86_64", "3WS:cups-devel-1:1.1.17-13.3.62.i386", "3WS:cups-devel-1:1.1.17-13.3.62.ia64", "3WS:cups-devel-1:1.1.17-13.3.62.ppc", "3WS:cups-devel-1:1.1.17-13.3.62.s390", "3WS:cups-devel-1:1.1.17-13.3.62.s390x", "3WS:cups-devel-1:1.1.17-13.3.62.x86_64", "3WS:cups-libs-1:1.1.17-13.3.62.i386", "3WS:cups-libs-1:1.1.17-13.3.62.ia64", "3WS:cups-libs-1:1.1.17-13.3.62.ppc", "3WS:cups-libs-1:1.1.17-13.3.62.ppc64", "3WS:cups-libs-1:1.1.17-13.3.62.s390", "3WS:cups-libs-1:1.1.17-13.3.62.s390x", "3WS:cups-libs-1:1.1.17-13.3.62.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.src", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups: DoS (stop, crash) by renewing CUPS browse packets" } ] }
gsd-2009-0949
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2009-0949", "description": "The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.", "id": "GSD-2009-0949", "references": [ "https://www.suse.com/security/cve/CVE-2009-0949.html", "https://www.debian.org/security/2009/dsa-1811", "https://access.redhat.com/errata/RHSA-2009:1083", "https://access.redhat.com/errata/RHSA-2009:1082", "https://linux.oracle.com/cve/CVE-2009-0949.html", "https://packetstormsecurity.com/files/cve/CVE-2009-0949" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2009-0949" ], "details": "The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.", "id": "GSD-2009-0949", "modified": "2023-12-13T01:19:43.968191Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0949", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35169", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35169" }, { "name": "DSA-1811", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1811" }, { "name": "35340", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35340" }, { "name": "oval:org.mitre.oval:def:9631", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9631" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=500972", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500972" }, { "name": "35342", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35342" }, { "name": "apple-cups-ipptag-dos(50926)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50926" }, { "name": "APPLE-SA-2009-09-10-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" }, { "name": "USN-780-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-780-1" }, { "name": "http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability", "refsource": "MISC", "url": "http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability" }, { "name": "35328", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35328" }, { "name": "RHSA-2009:1082", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1082.html" }, { "name": "35685", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35685" }, { "name": "SUSE-SR:2009:012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" }, { "name": "http://support.apple.com/kb/HT3865", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3865" }, { "name": "36701", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36701" }, { "name": "20090602 CORE-2009-0420 - Apple CUPS IPP_TAG_UNSUPPORTED Handling null pointer Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/504032/100/0/threaded" }, { "name": "RHSA-2009:1083", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1083.html" }, { "name": "1022321", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1022321" }, { "name": "35322", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35322" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB4D1818-1AE2-42FE-9856-5519EF7E0DAA", "versionEndExcluding": "1.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F5DEE66-117C-4844-8FD4-065D0820A808", "versionEndExcluding": "10.4.11", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A880FA4-5DBF-4894-8DAC-C3CD147D1EB7", "versionEndExcluding": "10.5.8", "versionStartIncluding": "10.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9ACE85A-56A0-404C-AB58-A4F5CA73243C", "versionEndExcluding": "10.4.11", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F74FAC0-CC05-4797-9DE2-F7CE5CB8FC19", "versionEndExcluding": "10.5.8", "versionStartIncluding": "10.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", "matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*", "matchCriteriaId": "C3243C77-D635-480D-908C-328A479719E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*", "matchCriteriaId": "AED08A6F-CD23-4405-B1CF-C96BB8AE7D6B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags." }, { "lang": "es", "value": "La funci\u00f3n ippReadIO en cups/ipp.c en cupsd en CUPS antes de la versi\u00f3n 1.3.10 no inicia de manera apropiada la memoria para paquetes de solicitud IPP, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero nulo y ca\u00edda del demonio) mediante una solicitud de programaci\u00f3n (scheduler) con dos etiquetas IPP_TAG_UNSUPPORTED consecutivas." } ], "id": "CVE-2009-0949", "lastModified": "2024-02-09T00:17:23.450", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2009-06-09T17:30:00.657", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/35322" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/35328" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/35340" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/35342" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/35685" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/36701" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1022321" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3865" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "http://www.debian.org/security/2009/dsa-1811" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1082.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1083.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/504032/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/35169" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-780-1" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500972" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50926" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9631" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-908" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.