|
rPath Security Advisory: 2009-0061-1 Published: 2009-04-17 Products: rPath Linux 1 rPath Linux 2 Rating: Severe Exposure Level Classification: Remote System User Deterministic Privilege Escalation Updated Versions: cups=conary.rpath.com@rpl:1/1.1.23-14.10-1 cups=conary.rpath.com@rpl:2/1.3.9-1.1-1 rPath Issue Tracking System: https://issues.rpath.com/browse/RPL-3015 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0164 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147 Description: Previous versions of CUPS contain multiple vulnerabilities, the most serious of which could allow an attacker to cause a denial of service or possibly execute arbitrary code. http://wiki.rpath.com/Advisories:rPSA-2009-0061 Copyright 2009 rPath, Inc. This file is distributed under the terms of the MIT License. A copy is available at http://www.rpath.com/permanent/mit-license.html