Summary: | net-print/cups <1.3.9-r1 buffer overflow in _cupsImageReadPNG() (CVE-2008-5286) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Stefan Behte (RETIRED) <craig> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | printing |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.cups.org/str.php?L2974 | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Stefan Behte (RETIRED)
2008-12-03 20:17:12 UTC
Please apply the patch or bump to 1.3.10 ASAP. Upstream patch added in net-print/cups-1.3.9-r1. Arches, please test and mark stable: =net-print/cups-1.3.9-r1 Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86" ppc stable amd64 stable rerating B1, network connectivity is not default and cups does not run as root, but lp. x86 stable ppc64 done Stable for HPPA. sparc stable arm/ia64 stable Stable on alpha. GLSA 200812-11 (apologies to Gentoo alpha users which got an unstable 1.3.9-r1 for a few hours after the advisory was sent) |