---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Mandriva update for cups SECUNIA ADVISORY ID: SA27724 VERIFY ADVISORY: http://secunia.com/advisories/27724/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Mandriva Linux 2007 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for cups. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. For more information: SA18332 SOLUTION: Apply updated packages. -- Mandriva Linux 2007 -- 4fd4b6a2d384e2cc599b415131a58edd 2007.0/i586/cups-1.2.4-1.5mdv2007.0.i586.rpm 29fd652c383d4ea688336bc143f1e5cf 2007.0/i586/cups-common-1.2.4-1.5mdv2007.0.i586.rpm 6a6c275bf900887bc34325ef552f39ab 2007.0/i586/cups-serial-1.2.4-1.5mdv2007.0.i586.rpm b2f487a129a0ae8cefd66bd89177f5bd 2007.0/i586/libcups2-1.2.4-1.5mdv2007.0.i586.rpm 853850aadbfed2e7a5fe76ddfd293990 2007.0/i586/libcups2-devel-1.2.4-1.5mdv2007.0.i586.rpm cdeaa28956923402a8986821fb01ec53 2007.0/i586/php-cups-1.2.4-1.5mdv2007.0.i586.rpm 5152934e9233e36bd1308d36144bbc1c 2007.0/SRPMS/cups-1.2.4-1.5mdv2007.0.src.rpm -- Mandriva Linux 2007/X86_64 -- 7df3b74de7c7d06ca7e750912993b85a 2007.0/x86_64/cups-1.2.4-1.5mdv2007.0.x86_64.rpm 7c8463926c7a618df34b5e31ddb3b80f 2007.0/x86_64/cups-common-1.2.4-1.5mdv2007.0.x86_64.rpm 49b51564f1e7ce0df1da99f7f86bff3c 2007.0/x86_64/cups-serial-1.2.4-1.5mdv2007.0.x86_64.rpm e6c50f4ec69f14569036549ee1402beb 2007.0/x86_64/lib64cups2-1.2.4-1.5mdv2007.0.x86_64.rpm 0d4f42989dc3604a551cf1f9f4bb1c76 2007.0/x86_64/lib64cups2-devel-1.2.4-1.5mdv2007.0.x86_64.rpm 8a9a47b66a117d76b6612ac247ee76fb 2007.0/x86_64/php-cups-1.2.4-1.5mdv2007.0.x86_64.rpm 5152934e9233e36bd1308d36144bbc1c 2007.0/SRPMS/cups-1.2.4-1.5mdv2007.0.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:228 OTHER REFERENCES: SA18332: http://secunia.com/advisories/18332/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------