[Pkg-cups-devel] cups update for CVE-2010-0302 in stable

Giuseppe Iuculano iuculano at debian.org
Mon Mar 29 16:24:03 UTC 2010


Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for cups some time ago.

CVE-2010-0302[0]:
| Use-after-free vulnerability in the abstract file-descriptor handling
| interface in the cupsdDoSelect function in scheduler/select.c in the
| scheduler in cupsd in CUPS 1.3.7, 1.3.9, 1.3.10, and 1.4.1, when
| kqueue or epoll is used, allows remote attackers to cause a denial of
| service (daemon crash or hang) via a client disconnection during
| listing of a large number of print jobs, related to improperly
| maintaining a reference count.  NOTE: some of these details are
| obtained from third party information.  NOTE: this vulnerability exists
| because of an incomplete fix for CVE-2009-3553.

Unfortunately the vulnerability described above is not important enough
to get it fixed via regular security update in Debian stable.
It do not warrant a DSA.

However it would be nice if this could get fixed via a regular point
update[1].
Please contact the release team for this.

This is an automatically generated mail, in case you are already working
on an
upgrade this is of course pointless.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0302
    http://security-tracker.debian.org/tracker/CVE-2010-0302
[1] http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: OpenPGP digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-cups-devel/attachments/20100329/251ae2eb/attachment.pgp>


More information about the Pkg-cups-devel mailing list