ELSA-2010-0811

ELSA-2010-0811 - cups security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2010-10-29

Description


[1.3.7-18:.8]
- Applied patch to fix cupsd memory corruption vulnerability
(CVE-2010-2941, STR #3648, bug #624438).
- Fix latent privilege escalation vulnerability (CVE-2010-2431,
STR #3510, bug #605397).


Related CVEs


CVE-2010-2431
CVE-2010-2941

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (i386) cups-1.3.7-18.el5_5.8.src.rpm1b4c2e41e8eaf79392b135026b833a52ELBA-2015-0064
cups-1.3.7-18.el5_5.8.i386.rpm7654e806ae2dc78b9d99d5223951784bELBA-2015-0064
cups-devel-1.3.7-18.el5_5.8.i386.rpm24bd417514fc0ffd771e8e53ab8d5ef8ELBA-2015-0064
cups-libs-1.3.7-18.el5_5.8.i386.rpm2adc358292a866acfdd88ecf38312285ELBA-2015-0064
cups-lpd-1.3.7-18.el5_5.8.i386.rpm6e41f3bc113b1e0b84cab5a559ceef1aELBA-2015-0064
Oracle Linux 5 (ia64) cups-1.3.7-18.el5_5.8.src.rpm1b4c2e41e8eaf79392b135026b833a52ELBA-2015-0064
cups-1.3.7-18.el5_5.8.ia64.rpm95e6fecff99e59560cc341236224047eELBA-2015-0064
cups-devel-1.3.7-18.el5_5.8.ia64.rpmd903139c3c4d962b5b7cc3a67dfe0c5dELBA-2015-0064
cups-libs-1.3.7-18.el5_5.8.i386.rpm2adc358292a866acfdd88ecf38312285ELBA-2015-0064
cups-libs-1.3.7-18.el5_5.8.ia64.rpm163e6f04c571aab2a333bebd4775c39bELBA-2015-0064
cups-lpd-1.3.7-18.el5_5.8.ia64.rpm745c9ce91b5bb4926e40ae5be6cbb246ELBA-2015-0064
Oracle Linux 5 (x86_64) cups-1.3.7-18.el5_5.8.src.rpm1b4c2e41e8eaf79392b135026b833a52ELBA-2015-0064
cups-1.3.7-18.el5_5.8.x86_64.rpm9e36f2ba4a7357319a4361b7d141ac05ELBA-2015-0064
cups-devel-1.3.7-18.el5_5.8.i386.rpm24bd417514fc0ffd771e8e53ab8d5ef8ELBA-2015-0064
cups-devel-1.3.7-18.el5_5.8.x86_64.rpm0ead074716454b08a7eb0b3fb9969682ELBA-2015-0064
cups-libs-1.3.7-18.el5_5.8.i386.rpm2adc358292a866acfdd88ecf38312285ELBA-2015-0064
cups-libs-1.3.7-18.el5_5.8.x86_64.rpm1a2f58b456a267ef4349d668ee5e96acELBA-2015-0064
cups-lpd-1.3.7-18.el5_5.8.x86_64.rpm256e117ebb6090879844a52a3e7142fdELBA-2015-0064



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete