安全研究

安全漏洞
CUPS cups/ipp.c空指针引用拒绝服务漏洞

发布日期:2009-06-02
更新日期:2009-06-03

受影响系统:
Easy Software Products CUPS < 1.3.10
不受影响系统:
Easy Software Products CUPS 1.3.10
描述:
BUGTRAQ  ID: 35169
CVE(CAN) ID: CVE-2009-0949

Common Unix Printing System(CUPS)是一款通用Unix打印系统,是Unix环境下的跨平台打印解决方案,基于Internet打印协议,提供大多数PostScript和raster打印机服务。

在处理包含有两个IPP_TAG_UNSUPPORTED标签的特质IPP时,CUPS的cups/ipp.c文件中的ippReadIO()函数没有正确地初始化ipp结构,这可能导致受影响的应用崩溃。

cups/ipp.c文件中的ippReadIO()函数负责初始化表示当前IPP请求中不同标签的ipp结构:

/-----------

1016 ipp_state_t                     /* O - Current state */
1017 ippReadIO(void        *src,     /* I - Data source */
1018           ipp_iocb_t  cb,       /* I - Read callback function */
1019           int         blocking, /* I - Use blocking IO? */
1020           ipp_t       *parent,  /* I - Parent request, if any */
1021           ipp_t       *ipp)     /* I - IPP data */
1022 {
1023   int       n;                  /* Length of data */
1024   unsigned  char buffer[IPP_MAX_LENGTH + 1],
1025                                 /* Data buffer */
1026   string[IPP_MAX_NAME],
1027                                 /* Small string buffer */
1028  *bufptr;                       /* Pointer into buffer */
1029  ipp_attribute_t    *attr;         /* Current attribute */
1030  ipp_tag_t       tag;           /* Current tag */
1031  ipp_tag_t       value_tag;     /* Current value tag */
1032  ipp_value_t     *value;        /* Current value */


1035  DEBUG_printf(("ippReadIO(%p, %p, %d, %p, %p)\n", src, cb, blocking,
1036                parent, ipp));
1037  DEBUG_printf(("ippReadIO: ipp->state=%d\n", ipp->state));

1039  if (src == NULL || ipp == NULL)
1040    return (IPP_ERROR);
1041
1042  switch (ipp->state)
1043  {
1044    case IPP_IDLE :
1045        ipp->state ++; /* Avoid common problem... */
1046
1047    case IPP_HEADER :
1048        if (parent == NULL)

- -----------/

在上面的代码中,通过几个不同的标签属性对报文进行计数。如果所发送的IPP报文标签属性低于0x10,CUPS就会认为是IPP_TAG_UNSUPPORTED标签:

/-----------

else if (tag < IPP_TAG_UNSUPPORTED_VALUE)
{
    /*
    * Group tag...  Set the current group and continue...
    */
    if (ipp->curtag == tag)
        ipp->prev = ippAddSeparator(ipp);
    else if (ipp->current)
        ipp->prev = ipp->current;

    ipp->curtag  = tag;
    ipp->current = NULL;
    DEBUG_printf(("ippReadIO: group tag = %x, ipp->prev=%p\n", tag,
ipp->prev));
    continue;
}

- -----------/

由于CUPS处理这类标签的方式,如果报文中包含有两个连续的IPP_TAG_UNSUPPORTED,就会将IPP结构的最后一个节点初始化为NULL,这会在cupsdProcessIPPRequest函数试图读取attr结构的name字段时导致崩溃。

/-----------

/*
* 'cupsdProcessIPPRequest()' - Process an incoming IPP request.
*/
int                                           /* O - 1 on success, 0 on
failure */
cupsdProcessIPPRequest( cupsd_client_t *con)  /* I - Client connection */

...
    if (!attr)
    {
        /*
        * Then make sure that the first three attributes are:
        *
        *     attributes-charset
        *     attributes-natural-language
        *     printer-uri/job-uri
        */

        attr = con->request->attrs;
        if (attr && !strcmp(attr->name, "attributes-charset") &&
(attr->value_tag & IPP_TAG_MASK) == IPP_TAG_CHARSET)
             charset = attr;
        else
             charset = NULL;
...

- -----------/

<*来源:Anibal Sacco
  
  链接:http://marc.info/?l=bugtraq&m=124397930025688&w=2
        https://www.redhat.com/support/errata/RHSA-2009-1083.html
        https://www.redhat.com/support/errata/RHSA-2009-1082.html
        http://www.debian.org/security/2009/dsa-1810
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-1810-1)以及相应补丁:
DSA-1810-1:New cups/cupsys packages fix denial of service
链接:http://www.debian.org/security/2009/dsa-1810

补丁下载:
Source archives:

http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7.orig.tar.gz
Size/MD5 checksum:  4214272 c9ba33356e5bb93efbcf77b6e142e498
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8.dsc
Size/MD5 checksum:     1094 42b2e4d0d1709d31270cbd0361ded3f4
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8.diff.gz
Size/MD5 checksum:   109744 c73260161da939be7517c6ff0c5493cb

Architecture independent packages:

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-common_1.2.7-4+etch8_all.deb
Size/MD5 checksum:   921366 4cec0d4b82b768bd42c801e87831eec9
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.2.7-4+etch8_all.deb
Size/MD5 checksum:    46424 bc032e7d1c4520843b540d3bb238d3a3

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_alpha.deb
Size/MD5 checksum:    72856 a2c626b3f8dd8e43cecc395c5cf9ef03
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_alpha.deb
Size/MD5 checksum:  1614886 8286658ca407d05ecc87ea4cd2dc870a
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_alpha.deb
Size/MD5 checksum:   183730 f2c644de893bf0ca28868cfecefca04d
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_alpha.deb
Size/MD5 checksum:    85916 7233e6ec6bb857653d2829cd80012d41
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_alpha.deb
Size/MD5 checksum:  1093518 e6544fc0edd973d09a1e00652991845b
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_alpha.deb
Size/MD5 checksum:    96030 23aca27ae72c081612fb247cfd9e33da
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_alpha.deb
Size/MD5 checksum:    39332 a931e92b73c1004f4c8ed110c01ac728
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_alpha.deb
Size/MD5 checksum:   175552 8bb48e7fdb170d74a14e65aecee3b230

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_amd64.deb
Size/MD5 checksum:  1087540 1e71685c6620845318d49cf1fcf5feb0
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_amd64.deb
Size/MD5 checksum:    87128 281a245270d6c2dcd7f0e1a6fc7d0b12
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_amd64.deb
Size/MD5 checksum:    37572 c0491559f8465d610a0577cc23f00de5
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_amd64.deb
Size/MD5 checksum:   162892 42d1cf5ceaa5ed7a95f16b869e6df97f
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_amd64.deb
Size/MD5 checksum:    80862 511e522206e17f759cd7c56e934f08bd
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_amd64.deb
Size/MD5 checksum:  1572040 e2582ab015e6e3a3858b713d6f159a34
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_amd64.deb
Size/MD5 checksum:    53056 d4c82327123ddc2c0e48c804634603ae
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_amd64.deb
Size/MD5 checksum:   142418 d9314cb33230b9c6dbe571671b14adda

arm architecture (ARM)

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_arm.deb
Size/MD5 checksum:  1023048 8b559f55ae312c59e22a113fd6928c5f
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_arm.deb
Size/MD5 checksum:    36758 cb2e80f86795f10af3fc100aa4506def
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_arm.deb
Size/MD5 checksum:  1567912 776f4974949a31b3facd38b302b8097a
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_arm.deb
Size/MD5 checksum:    78698 6122e3902076dd2c3247dd4b5a56a660
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_arm.deb
Size/MD5 checksum:    48958 92730848f69e8540412fdf8bdfb96c1f
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_arm.deb
Size/MD5 checksum:    85496 230c5b107dff69eca6f8d6241277a95f
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_arm.deb
Size/MD5 checksum:   154962 8803b8b5ac7a11e3a2cf5a40f389d049
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_arm.deb
Size/MD5 checksum:   131674 22e1a6767fc65ac920a5ce245743f9fd

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_hppa.deb
Size/MD5 checksum:   154688 26ee139a8daabd621479d73ac2d04a16
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_hppa.deb
Size/MD5 checksum:  1628398 beed29d0d6a15e33a83206acf3380cce
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_hppa.deb
Size/MD5 checksum:    57246 07d89a1799a8b8daf3fb13f8c0b155d3
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_hppa.deb
Size/MD5 checksum:    86802 f4e4a831a178e7e9df1f66a3af3633fb
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_hppa.deb
Size/MD5 checksum:   172252 78031fa93b94ba44187e0986e82d6201
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_hppa.deb
Size/MD5 checksum:    40370 b203925426b9411027184af8af2f73d6
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_hppa.deb
Size/MD5 checksum:  1037196 85cd25d326e4535a9a18921e1016788d
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_hppa.deb
Size/MD5 checksum:    91586 1ef7a9dd2be035a8504bd124e1da385d

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_i386.deb
Size/MD5 checksum:   137728 7f9d176b0cb1e5976ea06e58526a60f4
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_i386.deb
Size/MD5 checksum:    87336 3b3b4ffad78f35ffc5e05941bdfc15bd
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_i386.deb
Size/MD5 checksum:    37416 3513b7cef1c51a35efd9ffd3c294e14d
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_i386.deb
Size/MD5 checksum:  1000830 28dedcb611ed0538308122b860ba58c8
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_i386.deb
Size/MD5 checksum:    53206 d0ae9184a84597d989b69fe7e25bc470
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_i386.deb
Size/MD5 checksum:  1560356 5a8dc9c147a9d5c82224478f64731f0f
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_i386.deb
Size/MD5 checksum:    79744 40326a8b68de9dbe6987e39fe95a13f8
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_i386.deb
Size/MD5 checksum:   160956 da17f9d144495fde4e4c8bbad95560e8

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_ia64.deb
Size/MD5 checksum:   106218 609f68aa16bfd657583e8be99a2ad0c1
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_ia64.deb
Size/MD5 checksum:    74386 f0259501885d635d40aab9308a1bfbf3
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_ia64.deb
Size/MD5 checksum:   192362 9009b4a91e64ab0a1c325bcaec97c2e0
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_ia64.deb
Size/MD5 checksum:  1108908 1db7bb18903f47d5de29482709e3ff78
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_ia64.deb
Size/MD5 checksum:  1771178 f104a7cc65ef288cd7758bb2175709a0
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_ia64.deb
Size/MD5 checksum:   204522 8628cbc5cf2b22ed1d4eaeda2d7b4a60
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_ia64.deb
Size/MD5 checksum:    46334 726f90dd146cd9d2d6ad964c0e718585
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_ia64.deb
Size/MD5 checksum:   107424 c3c93da377fee4bf48f57778b305d5db

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_mips.deb
Size/MD5 checksum:  1098528 5a9e021f7509cbde95ef66da819c3228
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_mips.deb
Size/MD5 checksum:   150986 db510250f4f5aac631a743f04dc8054d
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_mips.deb
Size/MD5 checksum:    36124 d8663fcdd8acb88018af29a3af61c9f6
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_mips.deb
Size/MD5 checksum:   158310 776e9b5f14047779211e1262ae9f62d0
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_mips.deb
Size/MD5 checksum:    76166 26a80a28871b162d72c2469a18ce6966
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_mips.deb
Size/MD5 checksum:    87110 f71b2aa6af126f5ae434e1381126fc34
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_mips.deb
Size/MD5 checksum:  1568290 ad4192ffb0d477ae964f6c3b039e52ac
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_mips.deb
Size/MD5 checksum:    57678 da4e6ba9b1a61ad4bdc6a8e8d682fc61

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_mipsel.deb
Size/MD5 checksum:    87254 e2917b072751a45afba30498006b71c3
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_mipsel.deb
Size/MD5 checksum:   150894 09067f14c0938ef6dbeb500256dd42f9
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_mipsel.deb
Size/MD5 checksum:  1553678 c4168376ca4d74744e24be76ec159067
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_mipsel.deb
Size/MD5 checksum:   158842 f6d3053079e08de8e617272fd4a8489d
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_mipsel.deb
Size/MD5 checksum:  1086490 e82ba4868d85ad36861a8aff82f6f72a
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_mipsel.deb
Size/MD5 checksum:    36070 c67551d542db6a7b5081b8f0e1bdf30e
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_mipsel.deb
Size/MD5 checksum:    57804 fa0c855349bfa38f31c82e83374ccdab
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_mipsel.deb
Size/MD5 checksum:    77446 936b8d1173c259822d9e5ae3e82eb357

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_powerpc.deb
Size/MD5 checksum:    41342 f5d1131ddc30cb780322237c47411177
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_powerpc.deb
Size/MD5 checksum:  1147440 23944aceda9e865a4aab581509bb4058
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_powerpc.deb
Size/MD5 checksum:    89404 9a0198042c3eb4ef053f720d20706c34
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_powerpc.deb
Size/MD5 checksum:   163446 75275152a9b69f479d4b0c6ae8fb3fa0
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_powerpc.deb
Size/MD5 checksum:  1582758 4544b9bc4aaf231fe604449311f118b9
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_powerpc.deb
Size/MD5 checksum:    89574 942740b75d722b0fcbf284bc05035e48
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_powerpc.deb
Size/MD5 checksum:   136242 5ef0278b80c263897d8942f9bc03631e
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_powerpc.deb
Size/MD5 checksum:    51926 a35183dcb7bc3a0490b2ee1d8ed5ab3d

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_s390.deb
Size/MD5 checksum:    82334 745d2f27c678f02ad011fa15f1731560
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_s390.deb
Size/MD5 checksum:  1587692 d3c2245878121c7c16752f2b9949d0dc
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_s390.deb
Size/MD5 checksum:   166998 64e5615906a50a2c19ee5359a521a9f6
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_s390.deb
Size/MD5 checksum:    52522 199020914a0d52a771d112c6b2823de8
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_s390.deb
Size/MD5 checksum:  1037546 89b9f600cc2a513678446a2a2fcb5b81
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_s390.deb
Size/MD5 checksum:    88194 b376557a4f613fb65f46cbfae42050bf
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_s390.deb
Size/MD5 checksum:   144934 da63d5b24df68891c2806f0f514911e6
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_s390.deb
Size/MD5 checksum:    37422 3b0a8733a1ef7bf6fae8f00bb306bceb

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4+etch8_sparc.deb
Size/MD5 checksum:    78608 fb366ff39679d91c983deb2022ec0f0c
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4+etch8_sparc.deb
Size/MD5 checksum:   159716 eb0065adeacdf8a7f23098195a515e03
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4+etch8_sparc.deb
Size/MD5 checksum:    86066 5c0f9c078202fbf4c2f9c7cae3c89057
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4+etch8_sparc.deb
Size/MD5 checksum:  1578044 a94273670520f2db0fd4767ecb93cc4c
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4+etch8_sparc.deb
Size/MD5 checksum:    36060 b54d8ba11e9f8fd155e0b29f1609ebcd
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4+etch8_sparc.deb
Size/MD5 checksum:    51832 cb3bf2ee0f2d4661cd8198f8da780d00
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4+etch8_sparc.deb
Size/MD5 checksum:   996840 5609f09834fb8eecc031ad52bb1ba550
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4+etch8_sparc.deb
Size/MD5 checksum:   138744 5e701d9b2c7941e857c143e7289c3a20


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6.diff.gz
Size/MD5 checksum:   185068 01548b71a9c9f8f3cd4c4e38be162e0c
http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6.dsc
Size/MD5 checksum:     1837 74c7cc9607928673ef30937fa74d154c
http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8.orig.tar.gz
Size/MD5 checksum:  4796827 10efe9825c1a1dcd325be47a6cc21faf

Architecture independent packages:

http://security.debian.org/pool/updates/main/c/cups/cupsys_1.3.8-1+lenny6_all.deb
Size/MD5 checksum:    52146 7e655df3208e7b1c14e963e62d2a1f9e
http://security.debian.org/pool/updates/main/c/cups/libcupsys2-dev_1.3.8-1+lenny6_all.deb
Size/MD5 checksum:    52174 ca30676d4f14b19d69f07948ec920645
http://security.debian.org/pool/updates/main/c/cups/cupsys-client_1.3.8-1+lenny6_all.deb
Size/MD5 checksum:    52172 0745ebb9d35b06b2baed0946c9c4cdf4
http://security.debian.org/pool/updates/main/c/cups/cupsys-dbg_1.3.8-1+lenny6_all.deb
Size/MD5 checksum:    52162 39dda2a8979e6d53d369a850a7287f98
http://security.debian.org/pool/updates/main/c/cups/cupsys-bsd_1.3.8-1+lenny6_all.deb
Size/MD5 checksum:    52162 185cdcccb15621495bb4dd922824fb27
http://security.debian.org/pool/updates/main/c/cups/cupsys-common_1.3.8-1+lenny6_all.deb
Size/MD5 checksum:    52162 7cfc925b6070373cb03f50e28ffcb5eb
http://security.debian.org/pool/updates/main/c/cups/cups-common_1.3.8-1+lenny6_all.deb
Size/MD5 checksum:  1180808 ab548a8679a470d91055cb14a524f019
http://security.debian.org/pool/updates/main/c/cups/libcupsys2_1.3.8-1+lenny6_all.deb
Size/MD5 checksum:    52166 808680daaacf24e6969a46b5821c05b4

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_alpha.deb
Size/MD5 checksum:    37990 1d176c775ae611d5de6fc28debeac312
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_alpha.deb
Size/MD5 checksum:   108462 bee5be572e1c162c31a2f2cb6fccd95b
http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_alpha.deb
Size/MD5 checksum:   118450 c6848af4b97d419426046f53c0a10c8b
http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_alpha.deb
Size/MD5 checksum:   445916 a291be3dfa900c17126ce9796d71db2a
http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_alpha.deb
Size/MD5 checksum:  2099172 fabc17ee844d661b518a4c35321c5128
http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_alpha.deb
Size/MD5 checksum:  1142836 46addc9aade19f27e42b443768023f94
http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_alpha.deb
Size/MD5 checksum:   179128 0c7440b785436020854b72114e9e7686
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_alpha.deb
Size/MD5 checksum:    81496 5235f6c116886ee493467ff1e52dff9f

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_amd64.deb
Size/MD5 checksum:   168874 34599b5781a04df793603da238d30224
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_amd64.deb
Size/MD5 checksum:    61012 fcd44c54190e1f2212335b0f971b2241
http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_amd64.deb
Size/MD5 checksum:  1197270 584dbf166833f9f50a43137f1e2c04f7
http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_amd64.deb
Size/MD5 checksum:  2070558 64782a03e7391d3b983fe918b6d416a6
http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_amd64.deb
Size/MD5 checksum:   116780 317905cae4f2ba4acbdb62cc46b87e2a
http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_amd64.deb
Size/MD5 checksum:   401290 bdd244d1e6559d959eb803f8bd6abbf2
http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_amd64.deb
Size/MD5 checksum:    37236 b3642bfa15ff0fe3c6d983e031275da6
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_amd64.deb
Size/MD5 checksum:    99702 17dbaea17495777f8ba8a2996acc3725

arm architecture (ARM)

http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_arm.deb
Size/MD5 checksum:   387466 6ac7763fc0ade8a3703104cdd3c3357a
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_arm.deb
Size/MD5 checksum:    97190 e274997fb4e49c281c21549b1120efb2
http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_arm.deb
Size/MD5 checksum:   113164 eaa19c4d0964cd38613ab2c58f07ce26
http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_arm.deb
Size/MD5 checksum:  2059026 ee1367a147b8c07bae9c87ccc87c4998
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_arm.deb
Size/MD5 checksum:    55342 c57db0444dc9193f0ab35e1a934400ec
http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_arm.deb
Size/MD5 checksum:   155270 5f0300fb74cb89f6b9b7bb45537f4aec
http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_arm.deb
Size/MD5 checksum:  1123418 df0367cba01ba9919f409b022dbe7c1b
http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_arm.deb
Size/MD5 checksum:    36484 7294561d854c324dc268c8fb0d616a2a

armel architecture (ARM EABI)

http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_armel.deb
Size/MD5 checksum:  1128236 5fb35a72133c870e444fe0b1250db6b2
http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_armel.deb
Size/MD5 checksum:    38752 777da1a892c9d354f5e1ae2575b97d47
http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_armel.deb
Size/MD5 checksum:  2075760 a850581323f50e10ded793a321763a39
http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_armel.deb
Size/MD5 checksum:   387318 64dc6d3b023d3de8a9ad99c244555008
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_armel.deb
Size/MD5 checksum:    98356 96861930db8e85257fa250312839d177
http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_armel.deb
Size/MD5 checksum:   119314 7a4acbab9f1600e266780b8e4edc8161
http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_armel.deb
Size/MD5 checksum:   156808 a67d3ee08ed7bbcee2d90e45b4c5d9fc
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_armel.deb
Size/MD5 checksum:    54730 26bc079114200f249ee55182577d978b

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_hppa.deb
Size/MD5 checksum:   102958 61cca5c9fe91de9823fe3b141df6cbfd
http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_hppa.deb
Size/MD5 checksum:  2118150 9a34c8fcfda89744ff1ed5cb57fdeae1
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_hppa.deb
Size/MD5 checksum:    63136 dcc115ea567651075e3b7fbf73477f2c
http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_hppa.deb
Size/MD5 checksum:   406484 36b77c3f6c05df1f44b9a971b2fd3bc8
http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_hppa.deb
Size/MD5 checksum:   121714 30743045e4927713923ab1f3bb9e6360
http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_hppa.deb
Size/MD5 checksum:  1141670 a1d27d8aec34d3e1cefd8af9d680fdce
http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_hppa.deb
Size/MD5 checksum:   172628 bc5c1f4a039c3fb8dbfdd0dc36aa2f56
http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_hppa.deb
Size/MD5 checksum:    39974 b00448f41ec531188e029bc7173f5271

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_i386.deb
Size/MD5 checksum:    99256 289e9977f36773c117b6fcc6580b464f
http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_i386.deb
Size/MD5 checksum:  1096046 28adf6b61f8bff81e19ee5b7fc464aac
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_i386.deb
Size/MD5 checksum:    60422 d4646115f417b7d56b1665283e914b42
http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_i386.deb
Size/MD5 checksum:   115956 4db026d788ab7bcb923847491f46b8ca
http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_i386.deb
Size/MD5 checksum:  2051272 6b1ce4707c65c46af6ae766ce9b50e99
http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_i386.deb
Size/MD5 checksum:   165348 ffd04ab3b875fef36b26fe3dd1106996
http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_i386.deb
Size/MD5 checksum:   393998 080d022507d07a4713b3f95acb7c22f6
http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_i386.deb
Size/MD5 checksum:    38022 7990b6a4a8d217fe07e7e1bd0f9108ff

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_ia64.deb
Size/MD5 checksum:  2281420 2adc4c08d3bc24c8d70acac31ca8421a
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_ia64.deb
Size/MD5 checksum:   123434 e3c1cbbd801a0ddd985e3b27c021b9d8
http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_ia64.deb
Size/MD5 checksum:   209034 5bfbe9000e4f1cafdbc66a6a94c20e7b
http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_ia64.deb
Size/MD5 checksum:  1149350 7f6b259e7f4ecc70accf51236efb3a5a
http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_ia64.deb
Size/MD5 checksum:    41278 1cee7bf398c2e2c7e4189f005cbb3444
http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_ia64.deb
Size/MD5 checksum:   139124 8ff9597b3e2cd534614a66531a5db361
http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_ia64.deb
Size/MD5 checksum:   447412 b59175ffef15d9b2e618b85ce6f8cff2
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_ia64.deb
Size/MD5 checksum:    86018 e5badf6982128286853fc360fc77a4d3

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_mips.deb
Size/MD5 checksum:   157842 c3652835b110a94fc5a5f9d20230e443
http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_mips.deb
Size/MD5 checksum:  2047282 ce608c3fa6d89e7d7ff3e313f88fbef2
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_mips.deb
Size/MD5 checksum:    98662 ddbba9bea120f9b7740adc8ceb45c3dc
http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_mips.deb
Size/MD5 checksum:   108508 0a5b6ba27061cfa40e45cfc514d3ba0d
http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_mips.deb
Size/MD5 checksum:    36010 a786245e49b8cabcaad41a5e92a5c884
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_mips.deb
Size/MD5 checksum:    65290 155e5959fac035fc8307800061913d35
http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_mips.deb
Size/MD5 checksum:  1170866 11910e0f1ccbb2f3ba151cbfe8186696
http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_mips.deb
Size/MD5 checksum:   405510 4f848ff0dd8f2b08f3fa3bb220a6f75c

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_mipsel.deb
Size/MD5 checksum:   158274 8c3b143ee488c17cf00cf7599bee331c
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_mipsel.deb
Size/MD5 checksum:    98792 74a91f31a602f6f2a0c04b4e72723b86
http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_mipsel.deb
Size/MD5 checksum:  1156060 f3be7e74bd904dfdecc086bc6ee16bf5
http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_mipsel.deb
Size/MD5 checksum:   403142 42cf44870e91355bb7a465dce52605ae
http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_mipsel.deb
Size/MD5 checksum:    36142 daa9ed0b87002a002bece0890b1a6e12
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_mipsel.deb
Size/MD5 checksum:    65216 a1c8b686980e932f19a789430a4eafaa
http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_mipsel.deb
Size/MD5 checksum:  2028136 a67cf50db9734a8175936ff5e2d45d5d
http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_mipsel.deb
Size/MD5 checksum:   109968 23ff5d8a36aecd545c5cf210bc3873d5

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_powerpc.deb
Size/MD5 checksum:   394114 5309447c955f4decbe93f50802ed1805
http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_powerpc.deb
Size/MD5 checksum:  1188662 f8438353bab0a00502a1687042c54961
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_powerpc.deb
Size/MD5 checksum:    61144 ac80e1cd5cc0661c10693d360e32c11d
http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_powerpc.deb
Size/MD5 checksum:   174232 5938321743bda64571c6d0797f84dca1
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_powerpc.deb
Size/MD5 checksum:   104730 d5f60c53825c532dca34cb21f1c1d2fb
http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_powerpc.deb
Size/MD5 checksum:    44212 d0b547b8cf87254ce65874df057468db
http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_powerpc.deb
Size/MD5 checksum:   136102 34f3fbb1bf5519277c20944b3d118a6c
http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_powerpc.deb
Size/MD5 checksum:  2122006 f0e6902972831c2490b6f6bcbecd1ba0

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_s390.deb
Size/MD5 checksum:   101502 e48e528e2b3ee8140dcce180aae0feb8
http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_s390.deb
Size/MD5 checksum:    37818 7f26d32ff01aa1088e424a16439d0990
http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_s390.deb
Size/MD5 checksum:   171544 131841fd12d9331c312f8a28718fe8a1
http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_s390.deb
Size/MD5 checksum:   399662 f80688352e705e1293d64bb211dcd568
http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_s390.deb
Size/MD5 checksum:  2090700 7d406321bb349547bdbe43123fb770f3
http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_s390.deb
Size/MD5 checksum:   118588 64d6969a96a76de52a7296c745116a48
http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_s390.deb
Size/MD5 checksum:  1188192 365ee760b0b9b8dd869dd11f1f4c42f9
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_s390.deb
Size/MD5 checksum:    60716 634f2ba3cc0eb22c59252f15a1582770

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1+lenny6_sparc.deb
Size/MD5 checksum:   390982 1235ace473b594360267daef5663c1b3
http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1+lenny6_sparc.deb
Size/MD5 checksum:   116666 3c08364f33b2594c4f8be8c0bfce7333
http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1+lenny6_sparc.deb
Size/MD5 checksum:  1051168 056faed5a5baf927d91b21b4fe624812
http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1+lenny6_sparc.deb
Size/MD5 checksum:    38374 6401223175cfcf9082f3fac43a4f9d42
http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1+lenny6_sparc.deb
Size/MD5 checksum:  2069062 4041871842ca0f29408c95c39f9cbb68
http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1+lenny6_sparc.deb
Size/MD5 checksum:   160772 6a682010c72d5d78f4a6efcfb3ed5955
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1+lenny6_sparc.deb
Size/MD5 checksum:    57762 478e92cd02d8acb20a600d4ca61aba39
http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1+lenny6_sparc.deb
Size/MD5 checksum:    96996 37446d6e2f9dbf94122db96d1df00b9f

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

Easy Software Products
----------------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.cups.org

RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2009:1082-01)以及相应补丁:
RHSA-2009:1082-01:Important: cups security update
链接:https://www.redhat.com/support/errata/RHSA-2009-1082.html

浏览次数:9348
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障