An use-after-free flaw was found in the way CUPS handled references in its file descriptors handling interface. A remote attacker could, in a specially-crafted way, query for the list of current print jobs for a specific printer, leading to a denial of service (cupsd crash). Upstream bug report: ------------------- http://www.cups.org/str.php?L3200 Reproducer from upstream STR#3200 issue: ---------------------------------------- 1. produce 300 active jobs on the CUPS server. 2. extract client.zip to any directory 3. execute: java -cp "cups-java-client-1.3.jar";. TestCupsGetJobs 10.236.33.136 (replace 10.236.33.136 with your server address) Suggestion (tgurr): ------- Stabilize =net-print/cups-1.3.11-r2 which has the security patches provided by upstream applied (Note: =net-print/cups-1.4.2-r1 is patched as well). NOTE: Please delete your already downloaded cups-1.3.11-source.tar.bz2 from distfiles when stabilizing because of upstream tarball ping-pong ... Wrong size: DIST cups-1.3.11-source.tar.bz2 3799424 RMD160 Correct size: DIST cups-1.3.11-source.tar.bz2 3799393 RMD160
CVE-2009-3553 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3553): Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information.
The new file size breaks net-print/cups-1.3.11-r1. Trying out the -r2.
Why is net-print/cups-1.3.11-r2 not being stabilized?
(In reply to comment #3) > Why is net-print/cups-1.3.11-r2 not being stabilized? > Because arches have not been added to CC, thanks! Doing so now. Arches, please test and mark stable: =net-print/cups-1.4.4 Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86"
Oops, wrong version, should have been: Arches, please test and mark stable: =net-print/cups-1.3.11-r2 Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86"
x86 stable
ppc64 done
Stable for HPPA.
Stable on alpha.
amd64 done
arm/ia64/m68k/s390/sh/sparc stable
Marked ppc stable.
xiexie, folks. GLSA request filed.
Thanks guys. No vulnerable version left in the tree. Nothing left to do for printing.
This issue was resolved and addressed in GLSA 201207-10 at http://security.gentoo.org/glsa/glsa-201207-10.xml by GLSA coordinator Sean Amoss (ackle).