-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  cups (SSA:2015-188-01)

New cups packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix a security issue.


Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/cups-1.5.4-i486-4_slack14.1.txz:  Rebuilt.
  This release fixes a security issue:
  CWE-911: Improper Update of Reference Count - CVE-2015-1158
    This bug could allow an attacker to upload a replacement CUPS
    configuration file and mount further attacks.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/cups-1.3.11-i486-3_slack13.0.txz

Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/cups-1.3.11-x86_64-3_slack13.0.txz

Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/cups-1.4.5-i486-3_slack13.1.txz

Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/cups-1.4.5-x86_64-3_slack13.1.txz

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/cups-1.4.6-i486-2_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/cups-1.4.6-x86_64-2_slack13.37.txz

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/cups-1.5.4-i486-3_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/cups-1.5.4-x86_64-3_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/cups-1.5.4-i486-4_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/cups-1.5.4-x86_64-4_slack14.1.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/cups-2.0.3-i486-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/cups-2.0.3-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 13.0 package:
f013abe1761fb1a3a962ee6bb63bb12c  cups-1.3.11-i486-3_slack13.0.txz

Slackware x86_64 13.0 package:
88c5e1cf46eab8fd0d101e8411f10251  cups-1.3.11-x86_64-3_slack13.0.txz

Slackware 13.1 package:
f71f2b3066f4af9c407df75b1535f179  cups-1.4.5-i486-3_slack13.1.txz

Slackware x86_64 13.1 package:
2bf27108c7c2772e8adbd984efb0c55e  cups-1.4.5-x86_64-3_slack13.1.txz

Slackware 13.37 package:
0db4e57246873b1817f7332f90dd245f  cups-1.4.6-i486-2_slack13.37.txz

Slackware x86_64 13.37 package:
8d3ce5ec82218ebb001c0b46d891895a  cups-1.4.6-x86_64-2_slack13.37.txz

Slackware 14.0 package:
c9130b507a69775f68eb1ca71c2c746c  cups-1.5.4-i486-3_slack14.0.txz

Slackware x86_64 14.0 package:
e91436f9885350bc63a2d9484f974e66  cups-1.5.4-x86_64-3_slack14.0.txz

Slackware 14.1 package:
e7887e9c90b7501edca14157a85f7c3c  cups-1.5.4-i486-4_slack14.1.txz

Slackware x86_64 14.1 package:
712faf20c729a442d6229de6942aefc5  cups-1.5.4-x86_64-4_slack14.1.txz

Slackware -current package:
b92d4ad6d8da3487ca0445915ef6aa38  ap/cups-2.0.3-i486-1.txz

Slackware x86_64 -current package:
f740e4376110c797ef1926d5a94bea5a  ap/cups-2.0.3-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg cups-1.5.4-i486-4_slack14.1.txz

Then, restart the cups server:
# sh /etc/rc.d/rc.cups restart


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
secur...@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list:                          |
+------------------------------------------------------------------------+
| Send an email to majord...@slackware.com with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back containing instructions to    |
| complete the process.  Please do not reply to this email address.      |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlWcT3MACgkQakRjwEAQIjOPPgCfWEMJ+4TSxHdJoft5jqFEWPen
PiQAn3RLiMxllodW/nLPZnuwzh+MUNGb
=qxOS
-----END PGP SIGNATURE-----

Reply via email to