RHSA-2007:1020-01 Important: cups security and bug fix update
Posted on: 10/31/2007 04:00 PM

A new update is available for Red Hat Enterprise Linux. Here the announcement:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Important: cups security and bug fix update
Advisory ID: RHSA-2007:1020-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-1020.html
Issue date: 2007-10-31
Updated on: 2007-10-31
Product: Red Hat Enterprise Linux
CVE Names: CVE-2007-4351
- ---------------------------------------------------------------------

1. Summary:

Updated CUPS packages that fix a security issue in the Internet Printing
Protocol (IPP) handling and correct some bugs are now available for Red Hat
Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Problem description:

The Common UNIX Printing System (CUPS) provides a portable printing layer
for UNIX(R) operating systems.

A flaw was found in the way CUPS handles certain Internet Printing Protocol
(IPP) tags. A remote attacker who is able to connect to the IPP TCP port
could send a malicious request causing the CUPS daemon to crash, or
potentially execute arbitrary code. Please note that the default CUPS
configuration does not allow remote hosts to connect to the IPP TCP port.
(CVE-2007-4351)

Red Hat would like to thank Alin Rad Pop for reporting this issue.

All CUPS users are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue.

In addition, the following bugs were fixed:

* the CUPS service has been changed to start after sshd, to avoid causing
delays when logging in when the system is booted.

* the logrotate settings have been adjusted so they do not cause CUPS to
reload its configuration. This is to avoid re-printing the current job,
which could occur when it was a long-running job.

* a bug has been fixed in the handling of the If-Modified-Since: HTTP
header.

* in the LSPP configuration, labels for labeled jobs did not line-wrap.
This has been fixed.

* an access check in the LSPP configuration has been made more secure.

* the cups-lpd service no longer ignores the "-odocument-format=..."
option.

* a memory allocation bug has been fixed in cupsd.

* support for UNIX domain sockets authentication without passwords has been
added.

* in the LSPP configuration, a problem that could lead to cupsd crashing
has been fixed.

* the error handling in the initscript has been improved.

* The job-originating-host-name attribute was not correctly set for jobs
submitted via the cups-lpd service. This has been fixed.

* a problem with parsing IPv6 addresses in the configuration file has been
fixed.

* a problem that could lead to cupsd crashing when it failed to open a
"file:" URI has been fixed.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

213828 - Cups starts as S55cups, before sshd
228107 - [LSPP] Labels for labeled printing don't linewrap
229673 - [LSPP] cups is overriding mls when querying jobs with lpq -al
230073 - cups-lpd : server-args has no effect
230613 - [LSPP] cups is allowing users to delete other user's job
231522 - [LSPP] cupsd crash
237953 - Wrong init script
240223 - cups-lpd doesn't set 'job-originating-host-name'
241400 - IPV6 addresses not accepted in "Allow From" directives
250415 - cupsd crashes when failing to open a file: URI
345091 - CVE-2007-4351 cups boundary error

6. RPMs required:

Red Hat Enterprise Linux Desktop (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cups-1.2.4-11.14.el5_1.1.src.rpm
d4024b6f80540a02718c91f739a8bf05 cups-1.2.4-11.14.el5_1.1.src.rpm

i386:
04105308f4089ea32df6a2d8bf540d5a cups-1.2.4-11.14.el5_1.1.i386.rpm
a9214c78f171330d64a2b59932b5ca12 cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
b4e79e982cc21036b2848f6ded17ecdd cups-libs-1.2.4-11.14.el5_1.1.i386.rpm
0ad495e3b1565dcdf0f75eac2eb5e8a7 cups-lpd-1.2.4-11.14.el5_1.1.i386.rpm

x86_64:
0a7fe3996a0c8ea2feb144fa07f76d98 cups-1.2.4-11.14.el5_1.1.x86_64.rpm
a9214c78f171330d64a2b59932b5ca12 cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
a3f2712e792df40303b4c861864673c7 cups-debuginfo-1.2.4-11.14.el5_1.1.x86_64.rpm
b4e79e982cc21036b2848f6ded17ecdd cups-libs-1.2.4-11.14.el5_1.1.i386.rpm
056a430c4c1308c44c88441639e312b9 cups-libs-1.2.4-11.14.el5_1.1.x86_64.rpm
c9d27661f6732bda4ae0b30e8f0aa725 cups-lpd-1.2.4-11.14.el5_1.1.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cups-1.2.4-11.14.el5_1.1.src.rpm
d4024b6f80540a02718c91f739a8bf05 cups-1.2.4-11.14.el5_1.1.src.rpm

i386:
a9214c78f171330d64a2b59932b5ca12 cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
b4fe280e49d3dcf3c63fd54524390a09 cups-devel-1.2.4-11.14.el5_1.1.i386.rpm

x86_64:
a9214c78f171330d64a2b59932b5ca12 cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
a3f2712e792df40303b4c861864673c7 cups-debuginfo-1.2.4-11.14.el5_1.1.x86_64.rpm
b4fe280e49d3dcf3c63fd54524390a09 cups-devel-1.2.4-11.14.el5_1.1.i386.rpm
263d1d22a7c9be2f4dbd0c8b43b80e2a cups-devel-1.2.4-11.14.el5_1.1.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/cups-1.2.4-11.14.el5_1.1.src.rpm
d4024b6f80540a02718c91f739a8bf05 cups-1.2.4-11.14.el5_1.1.src.rpm

i386:
04105308f4089ea32df6a2d8bf540d5a cups-1.2.4-11.14.el5_1.1.i386.rpm
a9214c78f171330d64a2b59932b5ca12 cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
b4fe280e49d3dcf3c63fd54524390a09 cups-devel-1.2.4-11.14.el5_1.1.i386.rpm
b4e79e982cc21036b2848f6ded17ecdd cups-libs-1.2.4-11.14.el5_1.1.i386.rpm
0ad495e3b1565dcdf0f75eac2eb5e8a7 cups-lpd-1.2.4-11.14.el5_1.1.i386.rpm

ia64:
af37a1ebfdf26598d5897bc9507e78f3 cups-1.2.4-11.14.el5_1.1.ia64.rpm
a9214c78f171330d64a2b59932b5ca12 cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
75e856f97b8a1ae6d183ed3d4fdd8d68 cups-debuginfo-1.2.4-11.14.el5_1.1.ia64.rpm
7ac227b7833556eedb6ecba08ba6bca8 cups-devel-1.2.4-11.14.el5_1.1.ia64.rpm
b4e79e982cc21036b2848f6ded17ecdd cups-libs-1.2.4-11.14.el5_1.1.i386.rpm
50caa7e5a1665b947b6d4ce812b4c082 cups-libs-1.2.4-11.14.el5_1.1.ia64.rpm
887f0418bc37a56c2d1ac8d718b5f8b2 cups-lpd-1.2.4-11.14.el5_1.1.ia64.rpm

ppc:
6aa115515899f2ee4c7cea725a0ccabb cups-1.2.4-11.14.el5_1.1.ppc.rpm
fbb63189e62c3639add434d7a9522b25 cups-debuginfo-1.2.4-11.14.el5_1.1.ppc.rpm
0109adc637556efb2ebfc60f345e685f cups-debuginfo-1.2.4-11.14.el5_1.1.ppc64.rpm
3655447b3b729453387439aa0aee91af cups-devel-1.2.4-11.14.el5_1.1.ppc.rpm
bd9683c6898cdecf1064bdf9237a26f6 cups-devel-1.2.4-11.14.el5_1.1.ppc64.rpm
55cf96a356456cc9c97260424a180e74 cups-libs-1.2.4-11.14.el5_1.1.ppc.rpm
612f14d317b075c75b3ff6a879569a97 cups-libs-1.2.4-11.14.el5_1.1.ppc64.rpm
9ee96feb5dd1cb42503decbdc776d521 cups-lpd-1.2.4-11.14.el5_1.1.ppc.rpm

s390x:
cc0e592487e1443afe2632ce8132c200 cups-1.2.4-11.14.el5_1.1.s390x.rpm
cb49bab7c8c4d595dbefff730582311d cups-debuginfo-1.2.4-11.14.el5_1.1.s390.rpm
d6cd0e3e4eb460f33900ff066142c008 cups-debuginfo-1.2.4-11.14.el5_1.1.s390x.rpm
a4e18a2797c91483bffabefcb3bd257c cups-devel-1.2.4-11.14.el5_1.1.s390.rpm
00fbb56f9d73eec63607ea20febfa616 cups-devel-1.2.4-11.14.el5_1.1.s390x.rpm
754c8b7459b07318a7ee21e3947e0197 cups-libs-1.2.4-11.14.el5_1.1.s390.rpm
52ee99fe60dec2c85ef0489642ab5b6e cups-libs-1.2.4-11.14.el5_1.1.s390x.rpm
8779ba5c0746dad6c3899561b807b552 cups-lpd-1.2.4-11.14.el5_1.1.s390x.rpm

x86_64:
0a7fe3996a0c8ea2feb144fa07f76d98 cups-1.2.4-11.14.el5_1.1.x86_64.rpm
a9214c78f171330d64a2b59932b5ca12 cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
a3f2712e792df40303b4c861864673c7 cups-debuginfo-1.2.4-11.14.el5_1.1.x86_64.rpm
b4fe280e49d3dcf3c63fd54524390a09 cups-devel-1.2.4-11.14.el5_1.1.i386.rpm
263d1d22a7c9be2f4dbd0c8b43b80e2a cups-devel-1.2.4-11.14.el5_1.1.x86_64.rpm
b4e79e982cc21036b2848f6ded17ecdd cups-libs-1.2.4-11.14.el5_1.1.i386.rpm
056a430c4c1308c44c88441639e312b9 cups-libs-1.2.4-11.14.el5_1.1.x86_64.rpm
c9d27661f6732bda4ae0b30e8f0aa725 cups-lpd-1.2.4-11.14.el5_1.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4351
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is lt;secalert@redhat.comgt;. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFHKIjVXlSAg2UNWIIRApI+AKC3e/KnYzwl6suwIjq8+KhUWOX9MACgxEQ/
1vakibpF+OBG68Gso2X+FdY=
=ib5C
-----END PGP SIGNATURE-----



Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/rhsa_20071020_01_important_cups_security_and_bug_fix_update.html)