Alerta de Segurança Debian
DSA-110-1 cups -- buffer overflow
- Data do Alerta:
- 13 Fev 2002
- Pacotes Afetados:
- cupsys
- Vulnerável:
- Sim
- Referência à base de dados de segurança:
- No dicionário CVE do Mitre: CVE-2002-0063.
- Informações adicionais:
-
O autor do CUPS encontrou um falha potencial de buffer overflow no código do daemon CUPS, onde este lê os nomes dos atributos. Isto afeta todas as versões do CUPS.
O problema foi corrigido na versão 1.0.4-10 da distribuição estável do Debian e na versão 1.1.13-2 para as distribuições testing/unstable atuais.
Nós recomendamos que você atualize seus pacotes CUPS imediatamente.
- Corrigido em:
-
Debian GNU/Linux 2.2 (potato)
- Fonte:
- http://security.debian.org/dists/stable/updates/main/source/cupsys_1.0.4-10.dsc
- http://security.debian.org/dists/stable/updates/main/source/cupsys_1.0.4-10.diff.gz
- http://security.debian.org/dists/stable/updates/main/source/cupsys_1.0.4.orig.tar.gz
- http://security.debian.org/dists/stable/updates/main/source/cupsys_1.0.4-10.diff.gz
- Alpha:
- http://security.debian.org/dists/stable/updates/main/binary-alpha/cupsys-bsd_1.0.4-10_alpha.deb
- http://security.debian.org/dists/stable/updates/main/binary-alpha/cupsys_1.0.4-10_alpha.deb
- http://security.debian.org/dists/stable/updates/main/binary-alpha/libcupsys1-dev_1.0.4-10_alpha.deb
- http://security.debian.org/dists/stable/updates/main/binary-alpha/libcupsys1_1.0.4-10_alpha.deb
- http://security.debian.org/dists/stable/updates/main/binary-alpha/cupsys_1.0.4-10_alpha.deb
- ARM:
- http://security.debian.org/dists/stable/updates/main/binary-arm/cupsys-bsd_1.0.4-10_arm.deb
- http://security.debian.org/dists/stable/updates/main/binary-arm/cupsys_1.0.4-10_arm.deb
- http://security.debian.org/dists/stable/updates/main/binary-arm/libcupsys1-dev_1.0.4-10_arm.deb
- http://security.debian.org/dists/stable/updates/main/binary-arm/libcupsys1_1.0.4-10_arm.deb
- http://security.debian.org/dists/stable/updates/main/binary-arm/cupsys_1.0.4-10_arm.deb
- Intel ia32:
- http://security.debian.org/dists/stable/updates/main/binary-i386/cupsys-bsd_1.0.4-10_i386.deb
- http://security.debian.org/dists/stable/updates/main/binary-i386/cupsys_1.0.4-10_i386.deb
- http://security.debian.org/dists/stable/updates/main/binary-i386/libcupsys1-dev_1.0.4-10_i386.deb
- http://security.debian.org/dists/stable/updates/main/binary-i386/libcupsys1_1.0.4-10_i386.deb
- http://security.debian.org/dists/stable/updates/main/binary-i386/cupsys_1.0.4-10_i386.deb
- Motorola 680x0:
- http://security.debian.org/dists/stable/updates/main/binary-m68k/cupsys-bsd_1.0.4-10_m68k.deb
- http://security.debian.org/dists/stable/updates/main/binary-m68k/cupsys_1.0.4-10_m68k.deb
- http://security.debian.org/dists/stable/updates/main/binary-m68k/libcupsys1-dev_1.0.4-10_m68k.deb
- http://security.debian.org/dists/stable/updates/main/binary-m68k/libcupsys1_1.0.4-10_m68k.deb
- http://security.debian.org/dists/stable/updates/main/binary-m68k/cupsys_1.0.4-10_m68k.deb
- PowerPC:
- http://security.debian.org/dists/stable/updates/main/binary-powerpc/cupsys-bsd_1.0.4-10_powerpc.deb
- http://security.debian.org/dists/stable/updates/main/binary-powerpc/cupsys_1.0.4-10_powerpc.deb
- http://security.debian.org/dists/stable/updates/main/binary-powerpc/libcupsys1-dev_1.0.4-10_powerpc.deb
- http://security.debian.org/dists/stable/updates/main/binary-powerpc/libcupsys1_1.0.4-10_powerpc.deb
- http://security.debian.org/dists/stable/updates/main/binary-powerpc/cupsys_1.0.4-10_powerpc.deb
- Sun Sparc:
- http://security.debian.org/dists/stable/updates/main/binary-sparc/cupsys-bsd_1.0.4-10_sparc.deb
- http://security.debian.org/dists/stable/updates/main/binary-sparc/cupsys_1.0.4-10_sparc.deb
- http://security.debian.org/dists/stable/updates/main/binary-sparc/libcupsys1-dev_1.0.4-10_sparc.deb
- http://security.debian.org/dists/stable/updates/main/binary-sparc/libcupsys1_1.0.4-10_sparc.deb
- http://security.debian.org/dists/stable/updates/main/binary-sparc/cupsys_1.0.4-10_sparc.deb
Checksums MD5 dos arquivos listados estão disponíveis no alerta original.