1.29. cups


1.29.1. RHBA-2010:0045: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2010:0045
Updated cups packages that fix a severe memory leak in the CUPS scheduler are now available.
The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX and Unix-like operating systems.
This update addresses the following issue:
* when adding or modifying many printer queues, cupsd, the CUPS scheduler leaked memory. For example, running "lpstat" after creating several thousand printer queues caused cupsd to use all available memory, eventually killing other processes and bringing the system down. With this update cupsd no longer leaks memory when adding or modifying large numbers of printer queues and the associated out-of-memory errors and crashes no longer occur. (BZ#552213)
All cups users should upgrade to these updated packages, which resolves this issue.

1.29.2. RHSA-2010:0129: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2010:0129
Updated cups packages that fix one security issue are now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX operating systems.
It was discovered that the Red Hat Security Advisory RHSA-2009:1595 did not fully correct the use-after-free flaw in the way CUPS handled references in its file descriptors-handling interface. A remote attacker could send specially-crafted queries to the CUPS server, causing it to crash. (CVE-2010-0302)
Users of cups are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the cupsd daemon will be restarted automatically.

1.29.3. RHSA-2009:1595: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1595
Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
[Updated 12th January 2010] The packages list in this erratum has been updated to include missing i386 packages for Red Hat Enterprise Linux Desktop and RHEL Desktop Workstation.
The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX operating systems.
A use-after-free flaw was found in the way CUPS handled references in its file descriptors-handling interface. A remote attacker could, in a specially-crafted way, query for the list of current print jobs for a specific printer, leading to a denial of service (cupsd crash). (CVE-2009-3553)
Several cross-site scripting (XSS) flaws were found in the way the CUPS web server interface processed HTML form content. If a remote attacker could trick a local user who is logged into the CUPS web interface into visiting a specially-crafted HTML page, the attacker could retrieve and potentially modify confidential CUPS administration data. (CVE-2009-2820)
Red Hat would like to thank Aaron Sigel of Apple Product Security for responsibly reporting the CVE-2009-2820 issue.
Users of cups are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, the cupsd daemon will be restarted automatically.

1.29.4. RHSA-2009:1513: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1513
Updated cups packages that fix two security issues are now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX operating systems. The CUPS "pdftops" filter converts Portable Document Format (PDF) files to PostScript.
Two integer overflow flaws were found in the CUPS "pdftops" filter. An attacker could create a malicious PDF file that would cause "pdftops" to crash or, potentially, execute arbitrary code as the "lp" user if the file was printed. (CVE-2009-3608, CVE-2009-3609)
Red Hat would like to thank Chris Rohlf for reporting the CVE-2009-3608 issue.
Users of cups are advised to upgrade to these updated packages, which contain a backported patch to correct these issues. After installing the update, the cupsd daemon will be restarted automatically.

1.29.5. RHBA-2010:0210: bug fix update

Updated cups packages that fix several bugs are now available.
The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX operating systems.
These updated packages address the following bugs:
* landscape orientation jobs had incorrect page margins. This affects all landscape orientation PDF files, including any landscape job printed from Mac OS X. (BZ#447987)
* when running PHP files through the scheduler's web interface the wrong version PHP interpreter was used, causing missing header lines. (BZ#460898)
* the tmpwatch package is needed by cups but there was no package dependency on it. (BZ#487495)
* there was a memory leak in the scheduler's handling of "file:" device URIs. (BZ#496008)
* setting quota limits using the lpadmin command did not work correctly. (BZ#496082)
* there were several issues with CGI handling in the scheduler, causing custom CGI scripts not to work as expected. (BZ#497632, BZ#506316)
* the dependencies between the various sub-packages were not made explicit in the package requirements. (BZ#502205)
* jobs with multiple files could be removed from a disabled queue when it is re-enabled. (BZ#506257)
* the cups-lpd daemon, for handling RFC 1179 clients, could fail under load due to incorrect temporary file handling. (BZ#523152)
* the CUPS PDF input filter is no longer a separate PDF handling implementation, and instead uses the pdftops program from the poppler-utils package directly. (BZ#527429)
* adding or modifying many queues could cause the scheduler to leak large amounts of memory. (BZ#540646)
All cups users should upgrade to these updated packages, which resolve these issues.
Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.