First published: Wed Mar 03 2010(Updated: )
The Common UNIX Printing System (CUPS) provides a portable printing layer<br>for UNIX operating systems.<br>It was discovered that the Red Hat Security Advisory RHSA-2009:1595 did not<br>fully correct the use-after-free flaw in the way CUPS handled references in<br>its file descriptors-handling interface. A remote attacker could send<br>specially-crafted queries to the CUPS server, causing it to crash.<br>(CVE-2010-0302)<br>Users of cups are advised to upgrade to these updated packages, which<br>contain a backported patch to correct this issue. After installing the<br>update, the cupsd daemon will be restarted automatically.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cups | <1.3.7-11.el5_4.6 | 1.3.7-11.el5_4.6 |
redhat/cups | <1.3.7-11.el5_4.6 | 1.3.7-11.el5_4.6 |
redhat/cups-devel | <1.3.7-11.el5_4.6 | 1.3.7-11.el5_4.6 |
redhat/cups-devel | <1.3.7-11.el5_4.6 | 1.3.7-11.el5_4.6 |
redhat/cups-libs | <1.3.7-11.el5_4.6 | 1.3.7-11.el5_4.6 |
redhat/cups-libs | <1.3.7-11.el5_4.6 | 1.3.7-11.el5_4.6 |
redhat/cups-lpd | <1.3.7-11.el5_4.6 | 1.3.7-11.el5_4.6 |
redhat/cups-lpd | <1.3.7-11.el5_4.6 | 1.3.7-11.el5_4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.