---

Conectiva Linux Advisories: cups, net-snmp


CONECTIVA LINUX SECURITY ANNOUNCEMENT


PACKAGE : cups
SUMMARY : Denial of service vulnerability
DATE : 2003-11-07 15:34:00
ID : CLA-2003:779
RELEVANT
RELEASES
: 7.0, 8, 9

DESCRIPTION
Cups[1] (Common UNIX Printing System) is an open-source, freely
available and cross-platform printing solution for UNIX
environments.

It has been reported that the IPP daemon from the Cups package
can under some circumstances enter a loop and consume excessive CPU
resources, causing the service to become slow and unresponsive.

SOLUTION
It is recommended that all cups users upgrade their packages.

IMPORTANT: after the upgrade, it is necessary to manually
restart the service if it is already running. To do so, execute the
following command as root:

/sbin/service cups restart

REFERENCES

  1. http://www.cups.org
  2. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0788
  3. http://www.cups.org/str.php?L315+P0+S0+C0+I0+E0+Q
  4. http://bugzilla.conectiva.com.br/show_bug.cgi?id=8774

UPDATED PACKAGES

ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/cups-1.1.14-1U70_5cl.src.rpm


ftp://atualizacoes.conectiva.com.br/7.0/RPMS/cups-drivers-1.0-3U70_1cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/7.0/RPMS/cups-1.1.14-1U70_5cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/7.0/RPMS/cups-devel-1.1.14-1U70_5cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/7.0/RPMS/cups-doc-1.1.14-1U70_5cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/7.0/RPMS/cups-libs-1.1.14-1U70_5cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/7.0/RPMS/cups-devel-static-1.1.14-1U70_5cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/8/SRPMS/cups-1.1.14-2U80_5cl.src.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/cups-1.1.14-2U80_5cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/cups-devel-1.1.14-2U80_5cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/cups-devel-static-1.1.14-2U80_5cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/cups-doc-1.1.14-2U80_5cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/cups-libs-1.1.14-2U80_5cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/SRPMS/cups-1.1.18-29091U90_2cl.src.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/cups-1.1.18-29091U90_2cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/cups-devel-1.1.18-29091U90_2cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/cups-devel-static-1.1.18-29091U90_2cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/cups-doc-1.1.18-29091U90_2cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/cups-libs-1.1.18-29091U90_2cl.i386.rpm

ADDITIONAL INSTRUCTIONS
The apt tool can be used to perform RPM packages upgrades:

  • run: apt-get update
  • after that, execute: apt-get upgrade

Detailed instructions reagarding the use of apt and upgrade
examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en


All packages are signed with Conectiva’s GPG key. The key and
instructions on how to import it can be found at
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can
be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en


All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en


Copyright (c) 2003 Conectiva Inc.
http://www.conectiva.com


CONECTIVA LINUX SECURITY ANNOUNCEMENT


PACKAGE : net-snmp
SUMMARY : Fix for the net-snmp package
DATE : 2003-11-07 15:16:00
ID : CLA-2003:778
RELEVANT
RELEASES
: 9

DESCRIPTION
“net-snmp”[1] is an implementation and a set of tools to deal with
the Simple Network Management Protocol (SNMP), which is used for
remote administration and monitoring of network devices and
services.

“net-snmp” version 5.0.9 was released[2] to address a security
vulnerability in previous 5.0.x versions where an existing
user/community could get access to data in MIB objects that were
explicitly excluded from their view.

SOLUTION
It is recommended that all net-snmp users upgrade their
packages.

IMPORTANT: after the upgrade, the service must be manually
restarted if it was already running. To do this, execute the
following command as root:

/sbin/service snmpd restart

REFERENCES

  1. http://www.net-snmp.org/
  2. http://sourceforge.net/forum/forum.php?forum_id=308015

UPDATED PACKAGES

ftp://atualizacoes.conectiva.com.br/9/SRPMS/net-snmp-5.0.9-27290U90_1cl.src.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/net-snmp-5.0.9-27290U90_1cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/net-snmp-devel-5.0.9-27290U90_1cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/net-snmp-devel-static-5.0.9-27290U90_1cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/net-snmp-doc-5.0.9-27290U90_1cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/net-snmp-utils-5.0.9-27290U90_1cl.i386.rpm

ADDITIONAL INSTRUCTIONS
The apt tool can be used to perform RPM packages upgrades:

  • run: apt-get update
  • after that, execute: apt-get upgrade

Detailed instructions reagarding the use of apt and upgrade
examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en


All packages are signed with Conectiva’s GPG key. The key and
instructions on how to import it can be found at
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can
be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en


All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en


Copyright (c) 2003 Conectiva Inc.
http://www.conectiva.com

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis