[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 546/05 - Red Hat - Moderate: cups security update [RHSA-2005:571-01]



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 546/05 dated 15.07.05  Time: 14:48  
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====
Red Hat - Moderate: cups security update [RHSA-2005:571-01] 

Detail
====== 


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: cups security update
Advisory ID:       RHSA-2005:571-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-571.html
Issue date:        2005-07-14
Updated on:        2005-07-14
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2004-2154
- - ---------------------------------------------------------------------

1. Summary:

Updated CUPS packages that fix a security issue are now available for Red
Hat Enterprise Linux 3.

This update has been rated as having moderate security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

The Common UNIX Printing System (CUPS) provides a portable printing layer for
UNIX(R) operating systems.

When processing a request, the CUPS scheduler would use case-sensitive
matching on the queue name to decide which authorization policy should be
used.  However, queue names are not case-sensitive.  An unauthorized user
could print to a password-protected queue without needing a password.  The
Common Vulnerabilities and Exposures project has assigned the name
CAN-2005-2154 to this issue.

Please note that the version of CUPS included in Red Hat Enterprise Linux 4
is not vulnerable to this issue.

All users of CUPS should upgrade to these erratum packages which contain a
backported patch to correct this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

162405 - CAN-2004-2154 <Location ...> directive is case-sensitive in cupsd.conf but should not


6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/cups-1.1.17-13.3.29.src.rpm
81c72be8ece7d629a9a73ffa32916c41  cups-1.1.17-13.3.29.src.rpm

i386:
36bdfb6c6aa5eb58d5fe41b457ac7361  cups-1.1.17-13.3.29.i386.rpm
72307b7ee7bba211a5546a28362ac2a6  cups-devel-1.1.17-13.3.29.i386.rpm
5dc46b9df27b30286b6604c6a1e6ee98  cups-libs-1.1.17-13.3.29.i386.rpm

ia64:
36d374d2e1abacc34ce965750541626b  cups-1.1.17-13.3.29.ia64.rpm
7f3441b9e9879be1087bcd0607b1ab66  cups-devel-1.1.17-13.3.29.ia64.rpm
5dc46b9df27b30286b6604c6a1e6ee98  cups-libs-1.1.17-13.3.29.i386.rpm
a96ac4679c8b522d5433f23fade03f07  cups-libs-1.1.17-13.3.29.ia64.rpm

ppc:
86f8571af07d8d5fa479ed729a13af37  cups-1.1.17-13.3.29.ppc.rpm
ff62e1f6ae117e1db87a4299a4bd33a9  cups-devel-1.1.17-13.3.29.ppc.rpm
6e334775b2dbb8c09c25e011cb69cba4  cups-libs-1.1.17-13.3.29.ppc.rpm
9f23a140336a37a76bf6a9dbcbcdb9ff  cups-libs-1.1.17-13.3.29.ppc64.rpm

s390:
54d08a23a20b825b5c0c1e59ea0fe54b  cups-1.1.17-13.3.29.s390.rpm
eb62a6ea4f287a6eab9a0157f909e9e4  cups-devel-1.1.17-13.3.29.s390.rpm
e067385a2f2e9ab235bd9f98943626c7  cups-libs-1.1.17-13.3.29.s390.rpm

s390x:
d400e53066c2c831ae85155c9b8b0de0  cups-1.1.17-13.3.29.s390x.rpm
e3c00601315da00de3b8980a2c93aec8  cups-devel-1.1.17-13.3.29.s390x.rpm
e067385a2f2e9ab235bd9f98943626c7  cups-libs-1.1.17-13.3.29.s390.rpm
f6bb5b5be02c4acd32561a7a857c7eae  cups-libs-1.1.17-13.3.29.s390x.rpm

x86_64:
a692e1999e3ee1a95f3053d894675100  cups-1.1.17-13.3.29.x86_64.rpm
7f56302afb665afafcf61577a31bb1d6  cups-devel-1.1.17-13.3.29.x86_64.rpm
5dc46b9df27b30286b6604c6a1e6ee98  cups-libs-1.1.17-13.3.29.i386.rpm
56379591a637d0085b0838e0d97f0111  cups-libs-1.1.17-13.3.29.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/cups-1.1.17-13.3.29.src.rpm
81c72be8ece7d629a9a73ffa32916c41  cups-1.1.17-13.3.29.src.rpm

i386:
36bdfb6c6aa5eb58d5fe41b457ac7361  cups-1.1.17-13.3.29.i386.rpm
72307b7ee7bba211a5546a28362ac2a6  cups-devel-1.1.17-13.3.29.i386.rpm
5dc46b9df27b30286b6604c6a1e6ee98  cups-libs-1.1.17-13.3.29.i386.rpm

x86_64:
a692e1999e3ee1a95f3053d894675100  cups-1.1.17-13.3.29.x86_64.rpm
7f56302afb665afafcf61577a31bb1d6  cups-devel-1.1.17-13.3.29.x86_64.rpm
5dc46b9df27b30286b6604c6a1e6ee98  cups-libs-1.1.17-13.3.29.i386.rpm
56379591a637d0085b0838e0d97f0111  cups-libs-1.1.17-13.3.29.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/cups-1.1.17-13.3.29.src.rpm
81c72be8ece7d629a9a73ffa32916c41  cups-1.1.17-13.3.29.src.rpm

i386:
36bdfb6c6aa5eb58d5fe41b457ac7361  cups-1.1.17-13.3.29.i386.rpm
72307b7ee7bba211a5546a28362ac2a6  cups-devel-1.1.17-13.3.29.i386.rpm
5dc46b9df27b30286b6604c6a1e6ee98  cups-libs-1.1.17-13.3.29.i386.rpm

ia64:
36d374d2e1abacc34ce965750541626b  cups-1.1.17-13.3.29.ia64.rpm
7f3441b9e9879be1087bcd0607b1ab66  cups-devel-1.1.17-13.3.29.ia64.rpm
5dc46b9df27b30286b6604c6a1e6ee98  cups-libs-1.1.17-13.3.29.i386.rpm
a96ac4679c8b522d5433f23fade03f07  cups-libs-1.1.17-13.3.29.ia64.rpm

x86_64:
a692e1999e3ee1a95f3053d894675100  cups-1.1.17-13.3.29.x86_64.rpm
7f56302afb665afafcf61577a31bb1d6  cups-devel-1.1.17-13.3.29.x86_64.rpm
5dc46b9df27b30286b6604c6a1e6ee98  cups-libs-1.1.17-13.3.29.i386.rpm
56379591a637d0085b0838e0d97f0111  cups-libs-1.1.17-13.3.29.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/cups-1.1.17-13.3.29.src.rpm
81c72be8ece7d629a9a73ffa32916c41  cups-1.1.17-13.3.29.src.rpm

i386:
36bdfb6c6aa5eb58d5fe41b457ac7361  cups-1.1.17-13.3.29.i386.rpm
72307b7ee7bba211a5546a28362ac2a6  cups-devel-1.1.17-13.3.29.i386.rpm
5dc46b9df27b30286b6604c6a1e6ee98  cups-libs-1.1.17-13.3.29.i386.rpm

ia64:
36d374d2e1abacc34ce965750541626b  cups-1.1.17-13.3.29.ia64.rpm
7f3441b9e9879be1087bcd0607b1ab66  cups-devel-1.1.17-13.3.29.ia64.rpm
5dc46b9df27b30286b6604c6a1e6ee98  cups-libs-1.1.17-13.3.29.i386.rpm
a96ac4679c8b522d5433f23fade03f07  cups-libs-1.1.17-13.3.29.ia64.rpm

x86_64:
a692e1999e3ee1a95f3053d894675100  cups-1.1.17-13.3.29.x86_64.rpm
7f56302afb665afafcf61577a31bb1d6  cups-devel-1.1.17-13.3.29.x86_64.rpm
5dc46b9df27b30286b6604c6a1e6ee98  cups-libs-1.1.17-13.3.29.i386.rpm
56379591a637d0085b0838e0d97f0111  cups-libs-1.1.17-13.3.29.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-2154

8. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFC1qXLXlSAg2UNWIIRArVlAJ933Tn6L9v3/YDbNxnC76aUNEkWGQCfeDpx
X91TrYMxU8iEe+bECcYx1oI=
=GVe9
- -----END PGP SIGNATURE-----


- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 870 487 0748 Ext 4511
Fax: +44 (0) 870 487 0749

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 870 487 0748 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Red Hat for the information 
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBQte+WIpao72zK539AQGp/QQAlc7yJMwjlA4oIWpAto817quWzwxRG46W
X3Aw+1t+hdWRz4rO+DDxI83YiRDPiayZiWRxPx5Srk6EZmvDYMY8jg8ZVwIqeDAX
yohxc5qri1dvbkgxXjDOlahWUYYQFkQ05nFClASe0Z+OulI5cK6pHvXRg/7+Qh1c
TzSoMEwWYXw=
=tl/V
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________