[ubuntu/jaunty-security] cups_1.3.9-17ubuntu3.9_armel_translations.tar.gz, cups_1.3.9-17ubuntu3.9_amd64_translations.tar.gz, cups_1.3.9-17ubuntu3.9_hppa_translations.tar.gz, cups_1.3.9-17ubuntu3.9_sparc_translations.tar.gz (delayed), cups_1.3.9-17ubuntu3.9_i386_translations.tar.gz, cups_1.3.9-17ubuntu3.9_lpia_translations.tar.gz, cups_1.3.9-17ubuntu3.9_ia64_translations.tar.gz, cups, cups_1.3.9-17ubuntu3.9_powerpc_translations.tar.gz 1.3.9-17ubuntu3.9 (Accepted)

Ubuntu Installer archive at ubuntu.com
Mon Jun 21 18:04:50 BST 2010


cups (1.3.9-17ubuntu3.9) jaunty-security; urgency=low

  * SECURITY UPDATE: cross-site request forgery in admin interface
    - debian/patches/CVE-2010-0540.dpatch: add unpredictable session token
      to cgi-bin/admin.c, cgi-bin/cgi.h, cgi-bin/ipp-var.c,
      cgi-bin/template.c, cgi-bin/var.c, scheduler/client.c,
      templates/*.tmpl.
    - CVE-2010-0540
  * SECURITY UPDATE: denial of service or arbitrary code execution in
    texttops image filter
    - debian/patches/CVE-2010-0542.dpatch: make sure calloc succeeded in
      filter/texttops.c.
    - CVE-2010-0542
  * SECURITY UPDATE: web interface memory disclosure
    - debian/patches/CVE-2010-1748.dpatch: validate data in cgi-bin/var.c.
    - CVE-2010-1748
  * SECURITY UPDATE: file overwrite vulnerability
    - debian/patches/security-str3510.dpatch: introduce cups_open() in
      cups/file.c and use to make sure hard-linked or symlinked files don't
      get overwritten as root.
    - No CVE number

Date: Fri, 18 Jun 2010 10:26:08 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/jaunty/+source/cups/1.3.9-17ubuntu3.9
-------------- next part --------------
Format: 1.8
Date: Fri, 18 Jun 2010 10:26:08 -0400
Source: cups
Binary: libcups2 libcupsimage2 cups cups-client libcups2-dev libcupsimage2-dev cups-bsd cups-common cups-dbg cupsys cupsys-client cupsys-common cupsys-bsd cupsys-dbg libcupsys2 libcupsys2-dev
Architecture: source
Version: 1.3.9-17ubuntu3.9
Distribution: jaunty-security
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description: 
 cups       - Common UNIX Printing System(tm) - server
 cups-bsd   - Common UNIX Printing System(tm) - BSD commands
 cups-client - Common UNIX Printing System(tm) - client programs (SysV)
 cups-common - Common UNIX Printing System(tm) - common files
 cups-dbg   - Common UNIX Printing System(tm) - debugging symbols
 cupsys     - Common UNIX Printing System (transitional package)
 cupsys-bsd - Common UNIX Printing System (transitional package)
 cupsys-client - Common UNIX Printing System (transitional package)
 cupsys-common - Common UNIX Printing System (transitional package)
 cupsys-dbg - Common UNIX Printing System (transitional package)
 libcups2   - Common UNIX Printing System(tm) - libs
 libcups2-dev - Common UNIX Printing System(tm) - development files
 libcupsimage2 - Common UNIX Printing System(tm) - image libs
 libcupsimage2-dev - Common UNIX Printing System(tm) - image development files
 libcupsys2 - Common UNIX Printing System (transitional package)
 libcupsys2-dev - Common UNIX Printing System (transitional package)
Changes: 
 cups (1.3.9-17ubuntu3.9) jaunty-security; urgency=low
 .
   * SECURITY UPDATE: cross-site request forgery in admin interface
     - debian/patches/CVE-2010-0540.dpatch: add unpredictable session token
       to cgi-bin/admin.c, cgi-bin/cgi.h, cgi-bin/ipp-var.c,
       cgi-bin/template.c, cgi-bin/var.c, scheduler/client.c,
       templates/*.tmpl.
     - CVE-2010-0540
   * SECURITY UPDATE: denial of service or arbitrary code execution in
     texttops image filter
     - debian/patches/CVE-2010-0542.dpatch: make sure calloc succeeded in
       filter/texttops.c.
     - CVE-2010-0542
   * SECURITY UPDATE: web interface memory disclosure
     - debian/patches/CVE-2010-1748.dpatch: validate data in cgi-bin/var.c.
     - CVE-2010-1748
   * SECURITY UPDATE: file overwrite vulnerability
     - debian/patches/security-str3510.dpatch: introduce cups_open() in
       cups/file.c and use to make sure hard-linked or symlinked files don't
       get overwritten as root.
     - No CVE number
Checksums-Sha1: 
 5e589221bc9b11482489438ec328db3dd759c2db 1995 cups_1.3.9-17ubuntu3.9.dsc
 973e50f46068e659967614246457ee5e253a34e6 347764 cups_1.3.9-17ubuntu3.9.diff.gz
Checksums-Sha256: 
 986ca35aa5a6a054d1b1386587591f5c96261f7ff76d6ea90b6edfb064428dcf 1995 cups_1.3.9-17ubuntu3.9.dsc
 756c166c4adf650dc8f0288c0daf51387e10b8ee9bf238d1d4083dc351d7bc47 347764 cups_1.3.9-17ubuntu3.9.diff.gz
Files: 
 00cc768af9e65ccaaed74d7c4352e86d 1995 net optional cups_1.3.9-17ubuntu3.9.dsc
 2955695161c0ce780898d42714dba9c8 347764 net optional cups_1.3.9-17ubuntu3.9.diff.gz
Original-Maintainer: Debian CUPS Maintainers <pkg-cups-devel at lists.alioth.debian.org>


More information about the Jaunty-changes mailing list