ELSA-2022-4990

ELSA-2022-4990 - cups security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2022-07-01

Description


[1:2.3.3op2-13.1]
- CVE-2022-26691 cups: authorization bypass when using 'local' authorization


Related CVEs


CVE-2022-26691

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 9 (aarch64) cups-2.3.3op2-13.el9_0.1.src.rpm9c9a9dcbed151ae68501de17214266cb-
cups-2.3.3op2-13.el9_0.1.aarch64.rpmee25d2fe174aa31e466b4ea849512e2c-
cups-client-2.3.3op2-13.el9_0.1.aarch64.rpm06c74d767ccb62a8540e5aa0e77c0834-
cups-devel-2.3.3op2-13.el9_0.1.aarch64.rpm695cf59917c7efb2258045c92a173ebf-
cups-filesystem-2.3.3op2-13.el9_0.1.noarch.rpm196413aa59f84dddcd093b36df6ee2e6-
cups-ipptool-2.3.3op2-13.el9_0.1.aarch64.rpm540807d77e7ce3dd1e7ef836c7826ded-
cups-libs-2.3.3op2-13.el9_0.1.aarch64.rpmaee99d13978d0fb0b934e02320c47e38-
cups-lpd-2.3.3op2-13.el9_0.1.aarch64.rpm810d30bde6098516b896a33553068a40-
cups-printerapp-2.3.3op2-13.el9_0.1.aarch64.rpm5b296732b2ee77cbc1ee710a9007eaf9-
Oracle Linux 9 (x86_64) cups-2.3.3op2-13.el9_0.1.src.rpm9c9a9dcbed151ae68501de17214266cb-
cups-2.3.3op2-13.el9_0.1.x86_64.rpm85116425a727a8c9eeb0026e0d0168e4-
cups-client-2.3.3op2-13.el9_0.1.x86_64.rpmbe00be18cc89db5c0d9baa8ff4a85425-
cups-devel-2.3.3op2-13.el9_0.1.i686.rpm978b08cb0c606e21e13af6d0d715b906-
cups-devel-2.3.3op2-13.el9_0.1.x86_64.rpma58dd6f4bf1f01adb4f37add3d1821ed-
cups-filesystem-2.3.3op2-13.el9_0.1.noarch.rpm196413aa59f84dddcd093b36df6ee2e6-
cups-ipptool-2.3.3op2-13.el9_0.1.x86_64.rpmb7700c796a9d571da6d6cfbb533c9dad-
cups-libs-2.3.3op2-13.el9_0.1.i686.rpm97d61a9f5290c3306678691fa792c260-
cups-libs-2.3.3op2-13.el9_0.1.x86_64.rpm4089b0b7cd4d2909513d27f84b2fdb58-
cups-lpd-2.3.3op2-13.el9_0.1.x86_64.rpmf8c4c7eeaa9d4b0de2ca112f41fdbfe3-
cups-printerapp-2.3.3op2-13.el9_0.1.x86_64.rpm05267914da346102cdf5983075615778-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete