[Security Announce] [ MDKA-2006:028 ] - Updated cups packages to address initscript bug
[Posted July 12, 2006 by ris]
| From: |
| security-AT-mandriva.com |
| To: |
| security-announce-AT-mandrivalinux.org |
| Subject: |
| [Security Announce] [ MDKA-2006:028 ] - Updated cups packages to address initscript bug |
| Date: |
| Tue, 11 Jul 2006 15:10:00 -0600 |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Advisory MDKA-2006:028
http://www.mandriva.com/security/
_______________________________________________________________________
Package : cups
Date : July 11, 2006
Affected: 2006.0
_______________________________________________________________________
Problem Description:
A bug in the cupsd initscript could prevent a system from coming
fully online if the CUPS daemon does not get actually started
(for example if CUPS config or cache file are corrupted or port 631
blocked) by continuously attempting to see if the cups server is
available without a timeout.
Updated packages are provided that correct the issue.
_______________________________________________________________________
References:
http://qa.mandriva.com/show_bug.cgi?id=23547
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2006.0:
29dede44b3d4ee786357d847509f773d 2006.0/RPMS/cups-1.1.23-17.2.20060mdk.i586.rpm
804d7527553c6b6ace0748e5ef53ed62 2006.0/RPMS/cups-common-1.1.23-17.2.20060mdk.i586.rpm
53047de9f9d659e4f5e75149a9d022cd 2006.0/RPMS/cups-serial-1.1.23-17.2.20060mdk.i586.rpm
9c0230dc8984c6bcf820137eb4df0c66 2006.0/RPMS/libcups2-1.1.23-17.2.20060mdk.i586.rpm
543245cc6e269f59f6c27620324229b7 2006.0/RPMS/libcups2-devel-1.1.23-17.2.20060mdk.i586.rpm
5b7d574c53a93d10d7c7421d856a7003 2006.0/SRPMS/cups-1.1.23-17.2.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64:
bcf423d4f8fbbb5fc1ec2b326cda6727 x86_64/2006.0/RPMS/cups-1.1.23-17.2.20060mdk.x86_64.rpm
db13460799430736849afa20283bde90 x86_64/2006.0/RPMS/cups-common-1.1.23-17.2.20060mdk.x86_64.rpm
d4da97fd0d7c6acaac7187137e4599bf x86_64/2006.0/RPMS/cups-serial-1.1.23-17.2.20060mdk.x86_64.rpm
3466da0927bc821241f5f94af3dccd1c x86_64/2006.0/RPMS/lib64cups2-1.1.23-17.2.20060mdk.x86_64.rpm
cebd0d3e3c6808a290570c7c8eae877a
x86_64/2006.0/RPMS/lib64cups2-devel-1.1.23-17.2.20060mdk.x86_64.rpm
9c0230dc8984c6bcf820137eb4df0c66 x86_64/2006.0/RPMS/libcups2-1.1.23-17.2.20060mdk.i586.rpm
543245cc6e269f59f6c27620324229b7 x86_64/2006.0/RPMS/libcups2-devel-1.1.23-17.2.20060mdk.i586.rpm
5b7d574c53a93d10d7c7421d856a7003 x86_64/2006.0/SRPMS/cups-1.1.23-17.2.20060mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFEs+hSmqjQ0CJFipgRAuiVAJsGuPPbDx7VJyyfqONux9+YcTGuxwCffJVE
mx/fLEPcBeW49u0t3ir0FQ0=
=Pqh7
-----END PGP SIGNATURE-----
To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________