CUPS: Multiple vulnerabilities
Gentoo Linux Security Advisory
||GLSA 201207-10 / cups
||July 09, 2012
||July 09, 2012: 1
All supported architectures
#295256, #308045, #325551, #380771
Multiple vulnerabilities have been found in CUPS, some of which may
allow execution of arbitrary code or local privilege escalation.
CUPS, the Common Unix Printing System, is a full-featured print server.
Multiple vulnerabilities have been discovered in CUPS. Please review the
CVE identifiers referenced below for details.
A remote attacker may be able to execute arbitrary code using specially
crafted streams, IPP requests or files, or cause a Denial of Service
(daemon crash or hang). A local attacker may be able to gain escalated
privileges or overwrite arbitrary files. Furthermore, a remote attacker
may be able to obtain sensitive information from the CUPS process or
hijack a CUPS administrator authentication request.
There is no known workaround at this time.
All CUPS users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-print/cups-1.4.8-r1"
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since September 03, 2011. It is likely that your system is
already no longer affected by this issue.