Skip to navigation

Security Advisory Important: cups security update

Advisory: RHSA-2009:1082-1
Type: Security Advisory
Severity: Important
Issued on: 2009-06-03
Last updated on: 2009-06-03
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.3.z server)
Red Hat Enterprise Linux Long Life (v. 5.3 server)
CVEs (cve.mitre.org): CVE-2009-0949

Details

Updated cups packages that fix one security issue are now available for Red
Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The Common UNIX® Printing System (CUPS) provides a portable printing layer
for UNIX operating systems. The Internet Printing Protocol (IPP) allows
users to print and manage printing-related tasks over a network.

A NULL pointer dereference flaw was found in the CUPS IPP routine, used for
processing incoming IPP requests for the CUPS scheduler. An attacker could
use this flaw to send specially-crafted IPP requests that would crash the
cupsd daemon. (CVE-2009-0949)

Red Hat would like to thank Anibal Sacco from Core Security Technologies
for reporting this issue.

Users of cups are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing this
update, the cupsd daemon will be restarted automatically.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
cups-1.3.7-8.el5_3.6.src.rpm
File outdated by:  RHSA-2013:0580
    MD5: 03c3988058ebb998d50c9a4b255479fe
 
IA-32:
cups-devel-1.3.7-8.el5_3.6.i386.rpm
File outdated by:  RHSA-2013:0580
    MD5: 8c0f298fe02225c80534ac1828acaf4f
 
x86_64:
cups-devel-1.3.7-8.el5_3.6.i386.rpm
File outdated by:  RHSA-2013:0580
    MD5: 8c0f298fe02225c80534ac1828acaf4f
cups-devel-1.3.7-8.el5_3.6.x86_64.rpm
File outdated by:  RHSA-2013:0580
    MD5: 5f5b3435f8d295e0a7de98a50d195ace
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
cups-1.3.7-8.el5_3.6.src.rpm
File outdated by:  RHSA-2013:0580
    MD5: 03c3988058ebb998d50c9a4b255479fe
 
IA-32:
cups-1.3.7-8.el5_3.6.i386.rpm
File outdated by:  RHSA-2013:0580
    MD5: f1a86148ac6b24c9aea657344f8e0933
cups-devel-1.3.7-8.el5_3.6.i386.rpm
File outdated by:  RHSA-2013:0580
    MD5: 8c0f298fe02225c80534ac1828acaf4f
cups-libs-1.3.7-8.el5_3.6.i386.rpm
File outdated by:  RHSA-2013:0580
    MD5: 70c8f43107247a2548260c754bbace87
cups-lpd-1.3.7-8.el5_3.6.i386.rpm
File outdated by:  RHSA-2013:0580
    MD5: 0867925ea639f9fa039c6f2e75a18183
 
IA-64:
cups-1.3.7-8.el5_3.6.ia64.rpm
File outdated by:  RHSA-2013:0580
    MD5: c40af56f0ad10e892fbb5d435589187e
cups-devel-1.3.7-8.el5_3.6.ia64.rpm
File outdated by:  RHSA-2013:0580
    MD5: 4c324b14d88fd3540171f28b4d530627
cups-libs-1.3.7-8.el5_3.6.i386.rpm
File outdated by:  RHSA-2013:0580
    MD5: 70c8f43107247a2548260c754bbace87
cups-libs-1.3.7-8.el5_3.6.ia64.rpm
File outdated by:  RHSA-2013:0580
    MD5: 518b18c1d4058706a7f5abab9b4c0172
cups-lpd-1.3.7-8.el5_3.6.ia64.rpm
File outdated by:  RHSA-2013:0580
    MD5: 60fa584eff9be54207f1e8d2eeb4f83a
 
PPC:
cups-1.3.7-8.el5_3.6.ppc.rpm
File outdated by:  RHSA-2013:0580
    MD5: 5222fd346d85d74250c4ad83cff850d9
cups-devel-1.3.7-8.el5_3.6.ppc.rpm
File outdated by:  RHSA-2013:0580
    MD5: d1ba5a59449b77c19418e10814cf5e5b
cups-devel-1.3.7-8.el5_3.6.ppc64.rpm
File outdated by:  RHSA-2013:0580
    MD5: 2f5531fd26efb9e1eb86c718de545da5
cups-libs-1.3.7-8.el5_3.6.ppc.rpm
File outdated by:  RHSA-2013:0580
    MD5: 90d63d256928ef9f1f1531e3889318be
cups-libs-1.3.7-8.el5_3.6.ppc64.rpm
File outdated by:  RHSA-2013:0580
    MD5: 715bab00a331bc62618cad02b8124569
cups-lpd-1.3.7-8.el5_3.6.ppc.rpm
File outdated by:  RHSA-2013:0580
    MD5: 3f03b267cdea416504d270dc2a9d49e7
 
s390x:
cups-1.3.7-8.el5_3.6.s390x.rpm
File outdated by:  RHSA-2013:0580
    MD5: f4310703edda19d38d07cf8822c88d0e
cups-devel-1.3.7-8.el5_3.6.s390.rpm
File outdated by:  RHSA-2013:0580
    MD5: 249b3baffc9974864fe0a781d84e7b32
cups-devel-1.3.7-8.el5_3.6.s390x.rpm
File outdated by:  RHSA-2013:0580
    MD5: af4fc04cc92a9a28199f0940cbdf6276
cups-libs-1.3.7-8.el5_3.6.s390.rpm
File outdated by:  RHSA-2013:0580
    MD5: 970c8e5142d8ce96a29fdfb30b7edd96
cups-libs-1.3.7-8.el5_3.6.s390x.rpm
File outdated by:  RHSA-2013:0580
    MD5: bff295bed431d37b21ac338cf53af262
cups-lpd-1.3.7-8.el5_3.6.s390x.rpm
File outdated by:  RHSA-2013:0580
    MD5: e03b67b23ef42b85931763f3b10c9383
 
x86_64:
cups-1.3.7-8.el5_3.6.x86_64.rpm
File outdated by:  RHSA-2013:0580
    MD5: 718efb1f524259a2b632a68e42b5ecc1
cups-devel-1.3.7-8.el5_3.6.i386.rpm
File outdated by:  RHSA-2013:0580
    MD5: 8c0f298fe02225c80534ac1828acaf4f
cups-devel-1.3.7-8.el5_3.6.x86_64.rpm
File outdated by:  RHSA-2013:0580
    MD5: 5f5b3435f8d295e0a7de98a50d195ace
cups-libs-1.3.7-8.el5_3.6.i386.rpm
File outdated by:  RHSA-2013:0580
    MD5: 70c8f43107247a2548260c754bbace87
cups-libs-1.3.7-8.el5_3.6.x86_64.rpm
File outdated by:  RHSA-2013:0580
    MD5: cfb311e4d32235cb6108b01a9ec35b0d
cups-lpd-1.3.7-8.el5_3.6.x86_64.rpm
File outdated by:  RHSA-2013:0580
    MD5: d640e65a65f982fb97a863b0968a3f9f
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
cups-1.3.7-8.el5_3.6.src.rpm
File outdated by:  RHSA-2013:0580
    MD5: 03c3988058ebb998d50c9a4b255479fe
 
IA-32:
cups-1.3.7-8.el5_3.6.i386.rpm
File outdated by:  RHSA-2013:0580
    MD5: f1a86148ac6b24c9aea657344f8e0933
cups-libs-1.3.7-8.el5_3.6.i386.rpm
File outdated by:  RHSA-2013:0580
    MD5: 70c8f43107247a2548260c754bbace87
cups-lpd-1.3.7-8.el5_3.6.i386.rpm
File outdated by:  RHSA-2013:0580
    MD5: 0867925ea639f9fa039c6f2e75a18183
 
x86_64:
cups-1.3.7-8.el5_3.6.x86_64.rpm
File outdated by:  RHSA-2013:0580
    MD5: 718efb1f524259a2b632a68e42b5ecc1
cups-libs-1.3.7-8.el5_3.6.i386.rpm
File outdated by:  RHSA-2013:0580
    MD5: 70c8f43107247a2548260c754bbace87
cups-libs-1.3.7-8.el5_3.6.x86_64.rpm
File outdated by:  RHSA-2013:0580
    MD5: cfb311e4d32235cb6108b01a9ec35b0d
cups-lpd-1.3.7-8.el5_3.6.x86_64.rpm
File outdated by:  RHSA-2013:0580
    MD5: d640e65a65f982fb97a863b0968a3f9f
 
Red Hat Enterprise Linux EUS (v. 5.3.z server)

SRPMS:
cups-1.3.7-8.el5_3.6.src.rpm
File outdated by:  RHSA-2013:0580
    MD5: 03c3988058ebb998d50c9a4b255479fe
 
IA-32:
cups-1.3.7-8.el5_3.6.i386.rpm     MD5: f1a86148ac6b24c9aea657344f8e0933
cups-devel-1.3.7-8.el5_3.6.i386.rpm     MD5: 8c0f298fe02225c80534ac1828acaf4f
cups-libs-1.3.7-8.el5_3.6.i386.rpm     MD5: 70c8f43107247a2548260c754bbace87
cups-lpd-1.3.7-8.el5_3.6.i386.rpm     MD5: 0867925ea639f9fa039c6f2e75a18183
 
IA-64:
cups-1.3.7-8.el5_3.6.ia64.rpm     MD5: c40af56f0ad10e892fbb5d435589187e
cups-devel-1.3.7-8.el5_3.6.ia64.rpm     MD5: 4c324b14d88fd3540171f28b4d530627
cups-libs-1.3.7-8.el5_3.6.i386.rpm     MD5: 70c8f43107247a2548260c754bbace87
cups-libs-1.3.7-8.el5_3.6.ia64.rpm     MD5: 518b18c1d4058706a7f5abab9b4c0172
cups-lpd-1.3.7-8.el5_3.6.ia64.rpm     MD5: 60fa584eff9be54207f1e8d2eeb4f83a
 
PPC:
cups-1.3.7-8.el5_3.6.ppc.rpm     MD5: 5222fd346d85d74250c4ad83cff850d9
cups-devel-1.3.7-8.el5_3.6.ppc.rpm     MD5: d1ba5a59449b77c19418e10814cf5e5b
cups-devel-1.3.7-8.el5_3.6.ppc64.rpm     MD5: 2f5531fd26efb9e1eb86c718de545da5
cups-libs-1.3.7-8.el5_3.6.ppc.rpm     MD5: 90d63d256928ef9f1f1531e3889318be
cups-libs-1.3.7-8.el5_3.6.ppc64.rpm     MD5: 715bab00a331bc62618cad02b8124569
cups-lpd-1.3.7-8.el5_3.6.ppc.rpm     MD5: 3f03b267cdea416504d270dc2a9d49e7
 
s390x:
cups-1.3.7-8.el5_3.6.s390x.rpm     MD5: f4310703edda19d38d07cf8822c88d0e
cups-devel-1.3.7-8.el5_3.6.s390.rpm     MD5: 249b3baffc9974864fe0a781d84e7b32
cups-devel-1.3.7-8.el5_3.6.s390x.rpm     MD5: af4fc04cc92a9a28199f0940cbdf6276
cups-libs-1.3.7-8.el5_3.6.s390.rpm     MD5: 970c8e5142d8ce96a29fdfb30b7edd96
cups-libs-1.3.7-8.el5_3.6.s390x.rpm     MD5: bff295bed431d37b21ac338cf53af262
cups-lpd-1.3.7-8.el5_3.6.s390x.rpm     MD5: e03b67b23ef42b85931763f3b10c9383
 
x86_64:
cups-1.3.7-8.el5_3.6.x86_64.rpm     MD5: 718efb1f524259a2b632a68e42b5ecc1
cups-devel-1.3.7-8.el5_3.6.i386.rpm     MD5: 8c0f298fe02225c80534ac1828acaf4f
cups-devel-1.3.7-8.el5_3.6.x86_64.rpm     MD5: 5f5b3435f8d295e0a7de98a50d195ace
cups-libs-1.3.7-8.el5_3.6.i386.rpm     MD5: 70c8f43107247a2548260c754bbace87
cups-libs-1.3.7-8.el5_3.6.x86_64.rpm     MD5: cfb311e4d32235cb6108b01a9ec35b0d
cups-lpd-1.3.7-8.el5_3.6.x86_64.rpm     MD5: d640e65a65f982fb97a863b0968a3f9f
 
Red Hat Enterprise Linux Long Life (v. 5.3 server)

SRPMS:
cups-1.3.7-8.el5_3.6.src.rpm
File outdated by:  RHSA-2013:0580
    MD5: 03c3988058ebb998d50c9a4b255479fe
 
IA-32:
cups-1.3.7-8.el5_3.6.i386.rpm     MD5: f1a86148ac6b24c9aea657344f8e0933
cups-devel-1.3.7-8.el5_3.6.i386.rpm     MD5: 8c0f298fe02225c80534ac1828acaf4f
cups-libs-1.3.7-8.el5_3.6.i386.rpm     MD5: 70c8f43107247a2548260c754bbace87
cups-lpd-1.3.7-8.el5_3.6.i386.rpm     MD5: 0867925ea639f9fa039c6f2e75a18183
 
IA-64:
cups-1.3.7-8.el5_3.6.ia64.rpm     MD5: c40af56f0ad10e892fbb5d435589187e
cups-devel-1.3.7-8.el5_3.6.ia64.rpm     MD5: 4c324b14d88fd3540171f28b4d530627
cups-libs-1.3.7-8.el5_3.6.i386.rpm     MD5: 70c8f43107247a2548260c754bbace87
cups-libs-1.3.7-8.el5_3.6.ia64.rpm     MD5: 518b18c1d4058706a7f5abab9b4c0172
cups-lpd-1.3.7-8.el5_3.6.ia64.rpm     MD5: 60fa584eff9be54207f1e8d2eeb4f83a
 
x86_64:
cups-1.3.7-8.el5_3.6.x86_64.rpm     MD5: 718efb1f524259a2b632a68e42b5ecc1
cups-devel-1.3.7-8.el5_3.6.i386.rpm     MD5: 8c0f298fe02225c80534ac1828acaf4f
cups-devel-1.3.7-8.el5_3.6.x86_64.rpm     MD5: 5f5b3435f8d295e0a7de98a50d195ace
cups-libs-1.3.7-8.el5_3.6.i386.rpm     MD5: 70c8f43107247a2548260c754bbace87
cups-libs-1.3.7-8.el5_3.6.x86_64.rpm     MD5: cfb311e4d32235cb6108b01a9ec35b0d
cups-lpd-1.3.7-8.el5_3.6.x86_64.rpm     MD5: d640e65a65f982fb97a863b0968a3f9f
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

500972 - CVE-2009-0949 cups: IPP_TAG_UNSUPPORTED handling NULL pointer dereference DoS


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/