Jump to content
Compatible Support Forums
Sign in to follow this  
news

[RHSA-2011:1635-03] Low: cups security and bug fix update

Recommended Posts

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

=====================================================================

Red Hat Security Advisory

 

Synopsis: Low: cups security and bug fix update

Advisory ID: RHSA-2011:1635-03

Product: Red Hat Enterprise Linux

Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1635.html

Issue date: 2011-12-06

CVE Names: CVE-2011-2896

=====================================================================

 

1. Summary:

 

Updated cups packages that fix one security issue and several bugs are now

available for Red Hat Enterprise Linux 6.

 

The Red Hat Security Response Team has rated this update as having low

security impact. A Common Vulnerability Scoring System (CVSS) base score,

which gives a detailed severity rating, is available from the CVE link in

the References section.

 

2. Relevant releases/architectures:

 

Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64

Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64

Red Hat Enterprise Linux HPC Node (v. 6) - x86_64

Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64

Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64

Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64

Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64

Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

 

3. Description:

 

The Common UNIX Printing System (CUPS) provides a portable printing layer

for UNIX operating systems.

 

A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW)

decompression algorithm implementation used by the CUPS GIF image format

reader. An attacker could create a malicious GIF image file that, when

printed, could possibly cause CUPS to crash or, potentially, execute

arbitrary code with the privileges of the "lp" user. (CVE-2011-2896)

 

These updated cups packages also provide fixes for the following bugs:

 

* Previously CUPS was not correctly handling the language setting

LANG=en_US.ASCII. As a consequence lpadmin, lpstat and lpinfo binaries were

not displaying any output when the LANG=en_US.ASCII environment variable

was used. As a result of this update the problem is fixed and the expected

output is now displayed. (BZ#681836)

 

* Previously the scheduler did not check for empty values of several

configuration directives. As a consequence it was possible for the CUPS

daemon (cupsd) to crash when a configuration file contained certain empty

values. With this update the problem is fixed and cupsd no longer crashes

when reading such a configuration file. (BZ#706673)

 

* Previously when printing to a raw print queue, when using certain printer

models, CUPS was incorrectly sending SNMP queries. As a consequence there

was a noticeable 4-second delay between queueing the job and the start of

printing. With this update the problem is fixed and CUPS no longer tries to

collect SNMP supply and status information for raw print queues.

(BZ#709896)

 

* Previously when using the BrowsePoll directive it could happen that the

CUPS printer polling daemon (cups-polld) began polling before the network

interfaces were set up after a system boot. CUPS was then caching the

failed hostname lookup. As a consequence no printers were found and the

error, "Host name lookup failure", was logged. With this update the code

that re-initializes the resolver after failure in cups-polld is fixed and

as a result CUPS will obtain the correct network settings to use in printer

discovery. (BZ#712430)

 

* The MaxJobs directive controls the maximum number of print jobs that are

kept in memory. Previously, once the number of jobs reached the limit, the

CUPS system failed to automatically purge the data file associated with the

oldest completed job from the system in order to make room for a new print

job. This bug has been fixed, and the jobs beyond the set limit are now

properly purged. (BZ#735505)

 

* The cups init script (/etc/rc.d/init.d/cups) uses the daemon function

(from /etc/rc.d/init.d/functions) to start the cups process, but previously

it did not source a configuration file from the /etc/sysconfig/ directory.

As a consequence, it was difficult to cleanly set the nice level or cgroup

for the cups daemon by setting the NICELEVEL or CGROUP_DAEMON variables.

With this update, the init script is fixed. (BZ#744791)

 

All users of CUPS are advised to upgrade to these updated packages, which

contain backported patches to resolve these issues. After installing this

update, the cupsd daemon will be restarted automatically.

 

4. Solution:

 

Before applying this update, make sure all previously-released errata

relevant to your system have been applied.

 

This update is available via the Red Hat Network. Details on how to

use the Red Hat Network to apply this update are available at

https://access.redhat.com/kb/docs/DOC-11259

 

5. Bugs fixed (http://bugzilla.redhat.com/):

 

681836 - lpstat bug with ASCII encoding, LANG=en_US.ASCII lpstat -h localhost -s

706673 - Cups config parsing segfault

712430 - printers are not found after system boot

727800 - CVE-2011-2896 David Koblas' GIF decoder LZW decoder buffer overflow

735505 - CUPS is not purging JobFiles when MaxJobs is reached in RHEL6.1

744791 - cups init script should source /etc/sysconfig/cups

 

6. Package List:

 

Red Hat Enterprise Linux Desktop (v. 6):

 

Source:

ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm

 

i386:

cups-1.4.2-44.el6.i686.rpm

cups-debuginfo-1.4.2-44.el6.i686.rpm

cups-libs-1.4.2-44.el6.i686.rpm

cups-lpd-1.4.2-44.el6.i686.rpm

 

x86_64:

cups-1.4.2-44.el6.x86_64.rpm

cups-debuginfo-1.4.2-44.el6.i686.rpm

cups-debuginfo-1.4.2-44.el6.x86_64.rpm

cups-libs-1.4.2-44.el6.i686.rpm

cups-libs-1.4.2-44.el6.x86_64.rpm

cups-lpd-1.4.2-44.el6.x86_64.rpm

 

Red Hat Enterprise Linux Desktop Optional (v. 6):

 

Source:

ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm

 

i386:

cups-debuginfo-1.4.2-44.el6.i686.rpm

cups-devel-1.4.2-44.el6.i686.rpm

cups-php-1.4.2-44.el6.i686.rpm

 

x86_64:

cups-debuginfo-1.4.2-44.el6.i686.rpm

cups-debuginfo-1.4.2-44.el6.x86_64.rpm

cups-devel-1.4.2-44.el6.i686.rpm

cups-devel-1.4.2-44.el6.x86_64.rpm

cups-php-1.4.2-44.el6.x86_64.rpm

 

Red Hat Enterprise Linux HPC Node (v. 6):

 

Source:

ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm

 

x86_64:

cups-1.4.2-44.el6.x86_64.rpm

cups-debuginfo-1.4.2-44.el6.i686.rpm

cups-debuginfo-1.4.2-44.el6.x86_64.rpm

cups-libs-1.4.2-44.el6.i686.rpm

cups-libs-1.4.2-44.el6.x86_64.rpm

cups-lpd-1.4.2-44.el6.x86_64.rpm

 

Red Hat Enterprise Linux HPC Node Optional (v. 6):

 

Source:

ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm

 

x86_64:

cups-debuginfo-1.4.2-44.el6.i686.rpm

cups-debuginfo-1.4.2-44.el6.x86_64.rpm

cups-devel-1.4.2-44.el6.i686.rpm

cups-devel-1.4.2-44.el6.x86_64.rpm

cups-php-1.4.2-44.el6.x86_64.rpm

 

Red Hat Enterprise Linux Server (v. 6):

 

Source:

ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm

 

i386:

cups-1.4.2-44.el6.i686.rpm

cups-debuginfo-1.4.2-44.el6.i686.rpm

cups-devel-1.4.2-44.el6.i686.rpm

cups-libs-1.4.2-44.el6.i686.rpm

cups-lpd-1.4.2-44.el6.i686.rpm

 

ppc64:

cups-1.4.2-44.el6.ppc64.rpm

cups-debuginfo-1.4.2-44.el6.ppc.rpm

cups-debuginfo-1.4.2-44.el6.ppc64.rpm

cups-devel-1.4.2-44.el6.ppc.rpm

cups-devel-1.4.2-44.el6.ppc64.rpm

cups-libs-1.4.2-44.el6.ppc.rpm

cups-libs-1.4.2-44.el6.ppc64.rpm

cups-lpd-1.4.2-44.el6.ppc64.rpm

 

s390x:

cups-1.4.2-44.el6.s390x.rpm

cups-debuginfo-1.4.2-44.el6.s390.rpm

cups-debuginfo-1.4.2-44.el6.s390x.rpm

cups-devel-1.4.2-44.el6.s390.rpm

cups-devel-1.4.2-44.el6.s390x.rpm

cups-libs-1.4.2-44.el6.s390.rpm

cups-libs-1.4.2-44.el6.s390x.rpm

cups-lpd-1.4.2-44.el6.s390x.rpm

 

x86_64:

cups-1.4.2-44.el6.x86_64.rpm

cups-debuginfo-1.4.2-44.el6.i686.rpm

cups-debuginfo-1.4.2-44.el6.x86_64.rpm

cups-devel-1.4.2-44.el6.i686.rpm

cups-devel-1.4.2-44.el6.x86_64.rpm

cups-libs-1.4.2-44.el6.i686.rpm

cups-libs-1.4.2-44.el6.x86_64.rpm

cups-lpd-1.4.2-44.el6.x86_64.rpm

 

Red Hat Enterprise Linux Server Optional (v. 6):

 

Source:

ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm

 

i386:

cups-debuginfo-1.4.2-44.el6.i686.rpm

cups-php-1.4.2-44.el6.i686.rpm

 

ppc64:

cups-debuginfo-1.4.2-44.el6.ppc64.rpm

cups-php-1.4.2-44.el6.ppc64.rpm

 

s390x:

cups-debuginfo-1.4.2-44.el6.s390x.rpm

cups-php-1.4.2-44.el6.s390x.rpm

 

x86_64:

cups-debuginfo-1.4.2-44.el6.x86_64.rpm

cups-php-1.4.2-44.el6.x86_64.rpm

 

Red Hat Enterprise Linux Workstation (v. 6):

 

Source:

ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm

 

i386:

cups-1.4.2-44.el6.i686.rpm

cups-debuginfo-1.4.2-44.el6.i686.rpm

cups-devel-1.4.2-44.el6.i686.rpm

cups-libs-1.4.2-44.el6.i686.rpm

cups-lpd-1.4.2-44.el6.i686.rpm

 

x86_64:

cups-1.4.2-44.el6.x86_64.rpm

cups-debuginfo-1.4.2-44.el6.i686.rpm

cups-debuginfo-1.4.2-44.el6.x86_64.rpm

cups-devel-1.4.2-44.el6.i686.rpm

cups-devel-1.4.2-44.el6.x86_64.rpm

cups-libs-1.4.2-44.el6.i686.rpm

cups-libs-1.4.2-44.el6.x86_64.rpm

cups-lpd-1.4.2-44.el6.x86_64.rpm

 

Red Hat Enterprise Linux Workstation Optional (v. 6):

 

Source:

ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/cups-1.4.2-44.el6.src.rpm

 

i386:

cups-debuginfo-1.4.2-44.el6.i686.rpm

cups-php-1.4.2-44.el6.i686.rpm

 

x86_64:

cups-debuginfo-1.4.2-44.el6.x86_64.rpm

cups-php-1.4.2-44.el6.x86_64.rpm

 

These packages are GPG signed by Red Hat for security. Our key and

details on how to verify the signature are available from

https://access.redhat.com/security/team/key/#package

 

7. References:

 

https://www.redhat.com/security/data/cve/CVE-2011-2896.html

https://access.redhat.com/security/updates/classification/#low

 

8. Contact:

 

The Red Hat security contact is . More contact

details at https://access.redhat.com/security/team/contact/

 

Copyright 2011 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.4 (GNU/Linux)

 

iD8DBQFO3jdAXlSAg2UNWIIRAuf9AJ40wZu4zvl7/JluD0pOAIRHpsC9WACfQlq4

m4F9XjZwY5c1UV+v9+pq1hs=

=YoxJ

-----END PGP SIGNATURE-----

 

 

--

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×