-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] cups (SSA:2015-188-01)
New cups packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue. Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/cups-1.5.4-i486-4_slack14.1.txz: Rebuilt. This release fixes a security issue: CWE-911: Improper Update of Reference Count - CVE-2015-1158 This bug could allow an attacker to upload a replacement CUPS configuration file and mount further attacks. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/cups-1.3.11-i486-3_slack13.0.txz Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/cups-1.3.11-x86_64-3_slack13.0.txz Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/cups-1.4.5-i486-3_slack13.1.txz Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/cups-1.4.5-x86_64-3_slack13.1.txz Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/cups-1.4.6-i486-2_slack13.37.txz Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/cups-1.4.6-x86_64-2_slack13.37.txz Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/cups-1.5.4-i486-3_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/cups-1.5.4-x86_64-3_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/cups-1.5.4-i486-4_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/cups-1.5.4-x86_64-4_slack14.1.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/cups-2.0.3-i486-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/cups-2.0.3-x86_64-1.txz MD5 signatures: +-------------+ Slackware 13.0 package: f013abe1761fb1a3a962ee6bb63bb12c cups-1.3.11-i486-3_slack13.0.txz Slackware x86_64 13.0 package: 88c5e1cf46eab8fd0d101e8411f10251 cups-1.3.11-x86_64-3_slack13.0.txz Slackware 13.1 package: f71f2b3066f4af9c407df75b1535f179 cups-1.4.5-i486-3_slack13.1.txz Slackware x86_64 13.1 package: 2bf27108c7c2772e8adbd984efb0c55e cups-1.4.5-x86_64-3_slack13.1.txz Slackware 13.37 package: 0db4e57246873b1817f7332f90dd245f cups-1.4.6-i486-2_slack13.37.txz Slackware x86_64 13.37 package: 8d3ce5ec82218ebb001c0b46d891895a cups-1.4.6-x86_64-2_slack13.37.txz Slackware 14.0 package: c9130b507a69775f68eb1ca71c2c746c cups-1.5.4-i486-3_slack14.0.txz Slackware x86_64 14.0 package: e91436f9885350bc63a2d9484f974e66 cups-1.5.4-x86_64-3_slack14.0.txz Slackware 14.1 package: e7887e9c90b7501edca14157a85f7c3c cups-1.5.4-i486-4_slack14.1.txz Slackware x86_64 14.1 package: 712faf20c729a442d6229de6942aefc5 cups-1.5.4-x86_64-4_slack14.1.txz Slackware -current package: b92d4ad6d8da3487ca0445915ef6aa38 ap/cups-2.0.3-i486-1.txz Slackware x86_64 -current package: f740e4376110c797ef1926d5a94bea5a ap/cups-2.0.3-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg cups-1.5.4-i486-4_slack14.1.txz Then, restart the cups server: # sh /etc/rc.d/rc.cups restart +-----+ Slackware Linux Security Team http://slackware.com/gpg-key secur...@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majord...@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAlWcT3MACgkQakRjwEAQIjOPPgCfWEMJ+4TSxHdJoft5jqFEWPen PiQAn3RLiMxllodW/nLPZnuwzh+MUNGb =qxOS -----END PGP SIGNATURE-----