Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-0053 (GCVE-0-2008-0053)
Vulnerability from cvelistv5
Published
2008-03-18 23:00
Modified
2024-08-07 07:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:32:24.076Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2008:0206", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0206.html" }, { "name": "31324", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31324" }, { "name": "28304", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28304" }, { "name": "29659", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29659" }, { "name": "29573", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29573" }, { "name": "TA08-079A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html" }, { "name": "ADV-2008-0924", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "name": "USN-598-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-598-1" }, { "name": "SUSE-SA:2008:020", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00003.html" }, { "name": "MDVSA-2008:081", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081" }, { "name": "oval:org.mitre.oval:def:10356", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10356" }, { "name": "29420", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29420" }, { "name": "29630", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29630" }, { "name": "APPLE-SA-2008-03-18", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "name": "29750", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29750" }, { "name": "FEDORA-2008-2897", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html" }, { "name": "29634", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29634" }, { "name": "29655", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29655" }, { "name": "DSA-1625", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1625" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "name": "1019672", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019672" }, { "name": "28334", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28334" }, { "name": "macos-cups-inputvalidation-unspecified(41272)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41272" }, { "name": "RHSA-2008:0192", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0192.html" }, { "name": "GLSA-200804-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200804-01.xml" }, { "name": "29603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29603" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2008:0206", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0206.html" }, { "name": "31324", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31324" }, { "name": "28304", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28304" }, { "name": "29659", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29659" }, { "name": "29573", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29573" }, { "name": "TA08-079A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html" }, { "name": "ADV-2008-0924", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "name": "USN-598-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-598-1" }, { "name": "SUSE-SA:2008:020", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00003.html" }, { "name": "MDVSA-2008:081", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081" }, { "name": "oval:org.mitre.oval:def:10356", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10356" }, { "name": "29420", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29420" }, { "name": "29630", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29630" }, { "name": "APPLE-SA-2008-03-18", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "name": "29750", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29750" }, { "name": "FEDORA-2008-2897", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html" }, { "name": "29634", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29634" }, { "name": "29655", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29655" }, { "name": "DSA-1625", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1625" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "name": "1019672", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019672" }, { "name": "28334", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28334" }, { "name": "macos-cups-inputvalidation-unspecified(41272)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41272" }, { "name": "RHSA-2008:0192", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0192.html" }, { "name": "GLSA-200804-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200804-01.xml" }, { "name": "29603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29603" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2008:0206", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0206.html" }, { "name": "31324", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31324" }, { "name": "28304", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28304" }, { "name": "29659", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29659" }, { "name": "29573", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29573" }, { "name": "TA08-079A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html" }, { "name": "ADV-2008-0924", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "name": "USN-598-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-598-1" }, { "name": "SUSE-SA:2008:020", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00003.html" }, { "name": "MDVSA-2008:081", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081" }, { "name": "oval:org.mitre.oval:def:10356", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10356" }, { "name": "29420", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29420" }, { "name": "29630", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29630" }, { "name": "APPLE-SA-2008-03-18", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "name": "29750", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29750" }, { "name": "FEDORA-2008-2897", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html" }, { "name": "29634", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29634" }, { "name": "29655", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29655" }, { "name": "DSA-1625", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1625" }, { "name": "http://docs.info.apple.com/article.html?artnum=307562", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "name": "1019672", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019672" }, { "name": "28334", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28334" }, { "name": "macos-cups-inputvalidation-unspecified(41272)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41272" }, { "name": "RHSA-2008:0192", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0192.html" }, { "name": "GLSA-200804-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200804-01.xml" }, { "name": "29603", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29603" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0053", "datePublished": "2008-03-18T23:00:00", "dateReserved": "2008-01-03T00:00:00", "dateUpdated": "2024-08-07T07:32:24.076Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2008-0053\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-03-18T23:44:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de b\u00fafer en el filtro HP-GL/2-a-PostScript en CUPS versiones anteriores a 1.3.6, podr\u00edan permitir a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un archivo HP-GL/2 dise\u00f1ado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":true,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.3.5\",\"matchCriteriaId\":\"604D0E97-6CCF-4793-9A13-647CA5FFB9E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4D89E03-94D0-4F7F-9A54-3021E3E5A321\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298D6BE7-7683-4225-8DD6-4C0FC5EB48BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"230B77E7-B1AE-4470-859D-7B5F99749D74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8FECBBD-B1A2-4F42-8A68-32AB8331BDC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B6070FC-4566-4314-940E-0AAE34B56E28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC691F07-8B38-4867-AB18-51F380CAEA46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E943EFBF-39A7-408F-8AC5-677E83DFDBB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA7725A-4398-4C76-BEBF-10E56C7F34F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7415295-0FBF-4946-8D99-8CB2EC391319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C702EE3-4B7C-42EA-92AA-8717807CF67C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73F74581-D71C-4FEC-BA8C-85EF4C1991BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ABCFB52-33D3-428C-B1D5-DCE504170A37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45F03F2B-6AC3-4872-9032-293C2E9B837C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E02B6FB-C36D-45F3-95F3-566CA03B29A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96093309-A87D-48D0-84DA-446255ABF231\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF67F149-614B-4507-A15F-E557A1B73423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A14432-D8A1-4D19-9408-B9B4F2FC6B0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49862F77-B8DE-4AA7-AE17-B348B05AC00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78D7719F-03E0-4E66-A50A-F8E857A9B6AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3139FDA-9476-4414-B349-7119E63FD268\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"523FE78C-441F-4ACD-B9F2-3E5293E277AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F887B5B1-7528-4086-AE6C-134F54A93342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D6D24ED-0D73-4CF2-B746-6EF29F2EF56F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C5C552-6276-4791-80CD-6B3EB425EF04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8335D4E3-563D-4288-B708-A9635BCA595F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5279D055-248A-4BD1-9FBB-0024BA16DF5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF791C1D-9AF8-4F0F-8F4B-844BC9A55DFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"16519855-FCB9-44A8-9C7E-116192327BAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D9330B-C51A-4C7D-A322-85103C64D86C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA0C19F-95EB-429C-AF06-A2C1D5643662\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CCE80-FF4B-4B39-B8BD-EB4710047524\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"07925DD8-50C0-4908-95D1-7342A4617BBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48A519DB-6C6D-4094-814D-33BD5EF389BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6ED7566-5092-4B08-97A9-B2B53117A224\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"98DCAC0C-896F-4353-A665-5BCD0D8AEBA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E72614CD-8F70-4E07-AD83-8FDE8026CEC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"48E62419-C165-4B42-8C23-E24821BD4BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"217D804B-CA56-49CE-B9EB-2A297EB1763C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"A41E8583-C837-4871-B4D2-FD41C78D538E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D480C37B-0DA8-4096-80B0-5198FE589A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F5A83B-3C1A-49F3-A9D6-F7B9B897E447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"241D4183-879D-4974-BACB-A6987EDA2E7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96592A93-4967-4B91-BCF7-558DC472E7BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8758715D-B973-4960-8B7D-6F9A11E73288\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0370E9EB-B830-4362-B83C-912579695691\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA3EC6EE-720D-4F27-A2E1-88AE53FC41A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D644926A-C2A5-45FE-85A3-2782CE87ED86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB34629-DB13-4164-8A18-BD818E50528B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D432471-B5FD-4B1D-82DF-6F3152752071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"960DE41E-63DB-45EB-9B19-6349BDA05086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A57D2299-3409-4907-9FC0-5C3C715CDB37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7EB92FA-3669-4530-BE69-84CF01D98FF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0696E675-0A13-45FC-8917-845E6FF7A311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78BAC98C-1FE6-42A3-8B62-E3C321914F6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCC3EF2F-0140-4185-9FB3-2B595B61CDC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C36785A-F735-45C0-986B-9624AD65F0C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C1D3916-607F-44E8-9D47-93C6C0789083\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"174613C3-A04B-4701-849B-BAA598BF4F72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81C1137C-BE3D-45F9-83C9-D212107F0E14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CBC1F81-E93A-42A7-8BC8-4B903688F2E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FA876FF-C58A-45CF-A8E8-E2068DF79421\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FD78771-BD9A-4AC2-B664-B189DD288FB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50A16424-732F-4B76-A753-1642A97BC1EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E189C976-2DD2-485C-828E-7FC3DC6A8F32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A86CA90F-A944-4F3E-B75F-8147125335D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"690C4DEC-1467-4D7D-8E73-6EE1758439D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5CA96B-411E-47BE-81A1-1C2E240A25F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA5A29C9-1913-4B8F-B162-66E71BEABD1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FAFABDC-E40F-4C53-AC66-94EFD077665D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42A2F7B3-F4A7-416E-A07F-D4C5F0768B6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96C1B80-9E20-4832-8308-BF7911569EF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F2D7DB3-F467-4BC0-83BB-4706D067A2C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD33C2C-7D39-4CCE-AC99-BC7B1B205A4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C671B95-8892-4D71-87FE-BABF5CBEC144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBD0B172-FB22-4270-B73D-4489EC2F4CE6\"}]}]}],\"references\":[{\"url\":\"http://docs.info.apple.com/article.html?artnum=307562\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00003.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/29420\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29573\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29603\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29630\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29634\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29655\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29659\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29750\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31324\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200804-01.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1625\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:081\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0192.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0206.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/28304\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/28334\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1019672\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-598-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-079A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0924/references\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41272\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10356\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=307562\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29420\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29573\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29603\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29630\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29634\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29655\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29659\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29750\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31324\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200804-01.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1625\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:081\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0192.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0206.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/28304\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/28334\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1019672\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-598-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-079A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0924/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41272\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10356\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"NVD clarification:\\n\\nTo exploit this flaw an attacker needs to print a malicious file through the vulnerable filter (either themselves or by convincing a victim to do so), it should therefore be AC:M\\n\\nIn CUPS, print filters run as an unprivileged user no superuser (root), therefore this should be scored C:P, I:P, A:P\",\"lastModified\":\"2008-05-15T00:00:00\"}]}}" } }
rhsa-2008:0206
Vulnerability from csaf_redhat
Published
2008-04-01 14:23
Modified
2024-11-22 01:53
Summary
Red Hat Security Advisory: cups security update
Notes
Topic
Updated cups packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 3 and 4.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The Common UNIX Printing System (CUPS) provides a portable printing layer
for UNIX(R) operating systems.
Two overflows were discovered in the HP-GL/2-to-PostScript filter. An
attacker could create a malicious HP-GL/2 file that could possibly execute
arbitrary code as the "lp" user if the file is printed. (CVE-2008-0053)
A buffer overflow flaw was discovered in the GIF decoding routines used by
CUPS image converting filters "imagetops" and "imagetoraster". An attacker
could create a malicious GIF file that could possibly execute arbitrary
code as the "lp" user if the file was printed. (CVE-2008-1373)
It was discovered that the patch used to address CVE-2004-0888 in CUPS
packages in Red Hat Enterprise Linux 3 and 4 did not completely resolve the
integer overflow in the "pdftops" filter on 64-bit platforms. An attacker
could create a malicious PDF file that could possibly execute arbitrary
code as the "lp" user if the file was printed. (CVE-2008-1374)
All cups users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated cups packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 3 and 4.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Common UNIX Printing System (CUPS) provides a portable printing layer\nfor UNIX(R) operating systems.\n\nTwo overflows were discovered in the HP-GL/2-to-PostScript filter. An\nattacker could create a malicious HP-GL/2 file that could possibly execute\narbitrary code as the \"lp\" user if the file is printed. (CVE-2008-0053)\n\nA buffer overflow flaw was discovered in the GIF decoding routines used by\nCUPS image converting filters \"imagetops\" and \"imagetoraster\". An attacker\ncould create a malicious GIF file that could possibly execute arbitrary\ncode as the \"lp\" user if the file was printed. (CVE-2008-1373)\n\nIt was discovered that the patch used to address CVE-2004-0888 in CUPS\npackages in Red Hat Enterprise Linux 3 and 4 did not completely resolve the\ninteger overflow in the \"pdftops\" filter on 64-bit platforms. An attacker\ncould create a malicious PDF file that could possibly execute arbitrary\ncode as the \"lp\" user if the file was printed. (CVE-2008-1374)\n\nAll cups users are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0206", "url": "https://access.redhat.com/errata/RHSA-2008:0206" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "438117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438117" }, { "category": "external", "summary": "438303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438303" }, { "category": "external", "summary": "438336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0206.json" } ], "title": "Red Hat Security Advisory: cups security update", "tracking": { "current_release_date": "2024-11-22T01:53:15+00:00", "generator": { "date": "2024-11-22T01:53:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0206", "initial_release_date": "2008-04-01T14:23:00+00:00", "revision_history": [ { "date": "2008-04-01T14:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-04-01T10:23:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:53:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "product_id": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.20.2.el4_6.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "product_id": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.20.2.el4_6.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.20.2.el4_6.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "product": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "product_id": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.20.2.el4_6.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.52.ia64", "product": { "name": "cups-devel-1:1.1.17-13.3.52.ia64", "product_id": "cups-devel-1:1.1.17-13.3.52.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.52?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.52.ia64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.52.ia64", "product_id": "cups-debuginfo-1:1.1.17-13.3.52.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.52?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.52.ia64", "product": { "name": "cups-libs-1:1.1.17-13.3.52.ia64", "product_id": "cups-libs-1:1.1.17-13.3.52.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.52?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.52.ia64", "product": { "name": "cups-1:1.1.17-13.3.52.ia64", "product_id": "cups-1:1.1.17-13.3.52.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.52?arch=ia64\u0026epoch=1" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "product_id": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.20.2.el4_6.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.20.2.el4_6.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "product_id": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.20.2.el4_6.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "product": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "product_id": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.20.2.el4_6.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.52.i386", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.52.i386", "product_id": "cups-debuginfo-1:1.1.17-13.3.52.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.52?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.52.i386", "product": { "name": "cups-libs-1:1.1.17-13.3.52.i386", "product_id": "cups-libs-1:1.1.17-13.3.52.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.52?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.52.i386", "product": { "name": "cups-devel-1:1.1.17-13.3.52.i386", "product_id": "cups-devel-1:1.1.17-13.3.52.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.52?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.52.i386", "product": { "name": "cups-1:1.1.17-13.3.52.i386", "product_id": "cups-1:1.1.17-13.3.52.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.52?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "product_id": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.20.2.el4_6.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "product_id": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.20.2.el4_6.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.20.2.el4_6.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "product": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "product_id": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.20.2.el4_6.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.52.x86_64", "product": { "name": "cups-devel-1:1.1.17-13.3.52.x86_64", "product_id": "cups-devel-1:1.1.17-13.3.52.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.52?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.52.x86_64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.52.x86_64", "product_id": "cups-debuginfo-1:1.1.17-13.3.52.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.52?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.52.x86_64", "product": { "name": "cups-libs-1:1.1.17-13.3.52.x86_64", "product_id": "cups-libs-1:1.1.17-13.3.52.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.52?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.52.x86_64", "product": { "name": "cups-1:1.1.17-13.3.52.x86_64", "product_id": "cups-1:1.1.17-13.3.52.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.52?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "product": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "product_id": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.20.2.el4_6.6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.52.src", "product": { "name": "cups-1:1.1.17-13.3.52.src", "product_id": "cups-1:1.1.17-13.3.52.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.52?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "product_id": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.20.2.el4_6.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "product_id": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.20.2.el4_6.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.20.2.el4_6.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "product": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "product_id": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.20.2.el4_6.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.52.ppc", "product": { "name": "cups-devel-1:1.1.17-13.3.52.ppc", "product_id": "cups-devel-1:1.1.17-13.3.52.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.52?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.52.ppc", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.52.ppc", "product_id": "cups-debuginfo-1:1.1.17-13.3.52.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.52?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.52.ppc", "product": { "name": "cups-libs-1:1.1.17-13.3.52.ppc", "product_id": "cups-libs-1:1.1.17-13.3.52.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.52?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.52.ppc", "product": { "name": "cups-1:1.1.17-13.3.52.ppc", "product_id": "cups-1:1.1.17-13.3.52.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.52?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "product_id": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.20.2.el4_6.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.20.2.el4_6.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.52.ppc64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.52.ppc64", "product_id": "cups-debuginfo-1:1.1.17-13.3.52.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.52?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.52.ppc64", "product": { "name": "cups-libs-1:1.1.17-13.3.52.ppc64", "product_id": "cups-libs-1:1.1.17-13.3.52.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.52?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "product_id": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.20.2.el4_6.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "product_id": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.20.2.el4_6.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.20.2.el4_6.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "product": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "product_id": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.20.2.el4_6.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.52.s390x", "product": { "name": "cups-devel-1:1.1.17-13.3.52.s390x", "product_id": "cups-devel-1:1.1.17-13.3.52.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.52?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.52.s390x", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.52.s390x", "product_id": "cups-debuginfo-1:1.1.17-13.3.52.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.52?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.52.s390x", "product": { "name": "cups-libs-1:1.1.17-13.3.52.s390x", "product_id": "cups-libs-1:1.1.17-13.3.52.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.52?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.52.s390x", "product": { "name": "cups-1:1.1.17-13.3.52.s390x", "product_id": "cups-1:1.1.17-13.3.52.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.52?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "product_id": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.20.2.el4_6.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.20.2.el4_6.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "product_id": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.20.2.el4_6.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "product": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "product_id": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.20.2.el4_6.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.52.s390", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.52.s390", "product_id": "cups-debuginfo-1:1.1.17-13.3.52.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.52?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.52.s390", "product": { "name": "cups-libs-1:1.1.17-13.3.52.s390", "product_id": "cups-libs-1:1.1.17-13.3.52.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.52?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.52.s390", "product": { "name": "cups-devel-1:1.1.17-13.3.52.s390", "product_id": "cups-devel-1:1.1.17-13.3.52.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.52?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.52.s390", "product": { "name": "cups-1:1.1.17-13.3.52.s390", "product_id": "cups-1:1.1.17-13.3.52.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.52?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.52.src" }, "product_reference": "cups-1:1.1.17-13.3.52.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.52.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.52.src" }, "product_reference": "cups-1:1.1.17-13.3.52.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.52.src" }, "product_reference": "cups-1:1.1.17-13.3.52.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.52.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.52.src" }, "product_reference": "cups-1:1.1.17-13.3.52.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.52.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.52.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.52.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.52.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.52.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.52.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.52.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.52.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.52.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-0053", "discovery_date": "2008-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "438117" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: buffer overflows in HP-GL/2 filter", "title": "Vulnerability summary" }, { "category": "other", "text": "NVD clarification:\n\nTo exploit this flaw an attacker needs to print a malicious file through the vulnerable filter (either themselves or by convincing a victim to do so), it should therefore be AC:M\n\nIn CUPS, print filters run as an unprivileged user no superuser (root), therefore this should be scored C:P, I:P, A:P", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:cups-1:1.1.17-13.3.52.i386", "3AS:cups-1:1.1.17-13.3.52.ia64", "3AS:cups-1:1.1.17-13.3.52.ppc", "3AS:cups-1:1.1.17-13.3.52.s390", "3AS:cups-1:1.1.17-13.3.52.s390x", "3AS:cups-1:1.1.17-13.3.52.src", "3AS:cups-1:1.1.17-13.3.52.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3AS:cups-devel-1:1.1.17-13.3.52.i386", "3AS:cups-devel-1:1.1.17-13.3.52.ia64", "3AS:cups-devel-1:1.1.17-13.3.52.ppc", "3AS:cups-devel-1:1.1.17-13.3.52.s390", "3AS:cups-devel-1:1.1.17-13.3.52.s390x", "3AS:cups-devel-1:1.1.17-13.3.52.x86_64", "3AS:cups-libs-1:1.1.17-13.3.52.i386", "3AS:cups-libs-1:1.1.17-13.3.52.ia64", "3AS:cups-libs-1:1.1.17-13.3.52.ppc", "3AS:cups-libs-1:1.1.17-13.3.52.ppc64", "3AS:cups-libs-1:1.1.17-13.3.52.s390", "3AS:cups-libs-1:1.1.17-13.3.52.s390x", "3AS:cups-libs-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-1:1.1.17-13.3.52.i386", "3Desktop:cups-1:1.1.17-13.3.52.ia64", "3Desktop:cups-1:1.1.17-13.3.52.ppc", "3Desktop:cups-1:1.1.17-13.3.52.s390", "3Desktop:cups-1:1.1.17-13.3.52.s390x", "3Desktop:cups-1:1.1.17-13.3.52.src", "3Desktop:cups-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.52.i386", "3Desktop:cups-devel-1:1.1.17-13.3.52.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.52.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.52.i386", "3Desktop:cups-libs-1:1.1.17-13.3.52.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.52.x86_64", "3ES:cups-1:1.1.17-13.3.52.i386", "3ES:cups-1:1.1.17-13.3.52.ia64", "3ES:cups-1:1.1.17-13.3.52.ppc", "3ES:cups-1:1.1.17-13.3.52.s390", "3ES:cups-1:1.1.17-13.3.52.s390x", "3ES:cups-1:1.1.17-13.3.52.src", "3ES:cups-1:1.1.17-13.3.52.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3ES:cups-devel-1:1.1.17-13.3.52.i386", "3ES:cups-devel-1:1.1.17-13.3.52.ia64", "3ES:cups-devel-1:1.1.17-13.3.52.ppc", "3ES:cups-devel-1:1.1.17-13.3.52.s390", "3ES:cups-devel-1:1.1.17-13.3.52.s390x", "3ES:cups-devel-1:1.1.17-13.3.52.x86_64", "3ES:cups-libs-1:1.1.17-13.3.52.i386", "3ES:cups-libs-1:1.1.17-13.3.52.ia64", "3ES:cups-libs-1:1.1.17-13.3.52.ppc", "3ES:cups-libs-1:1.1.17-13.3.52.ppc64", "3ES:cups-libs-1:1.1.17-13.3.52.s390", "3ES:cups-libs-1:1.1.17-13.3.52.s390x", "3ES:cups-libs-1:1.1.17-13.3.52.x86_64", "3WS:cups-1:1.1.17-13.3.52.i386", "3WS:cups-1:1.1.17-13.3.52.ia64", "3WS:cups-1:1.1.17-13.3.52.ppc", "3WS:cups-1:1.1.17-13.3.52.s390", "3WS:cups-1:1.1.17-13.3.52.s390x", "3WS:cups-1:1.1.17-13.3.52.src", "3WS:cups-1:1.1.17-13.3.52.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3WS:cups-devel-1:1.1.17-13.3.52.i386", "3WS:cups-devel-1:1.1.17-13.3.52.ia64", "3WS:cups-devel-1:1.1.17-13.3.52.ppc", "3WS:cups-devel-1:1.1.17-13.3.52.s390", "3WS:cups-devel-1:1.1.17-13.3.52.s390x", "3WS:cups-devel-1:1.1.17-13.3.52.x86_64", "3WS:cups-libs-1:1.1.17-13.3.52.i386", "3WS:cups-libs-1:1.1.17-13.3.52.ia64", "3WS:cups-libs-1:1.1.17-13.3.52.ppc", "3WS:cups-libs-1:1.1.17-13.3.52.ppc64", "3WS:cups-libs-1:1.1.17-13.3.52.s390", "3WS:cups-libs-1:1.1.17-13.3.52.s390x", "3WS:cups-libs-1:1.1.17-13.3.52.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0053" }, { "category": "external", "summary": "RHBZ#438117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0053", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0053" } ], "release_date": "2008-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-04-01T14:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:cups-1:1.1.17-13.3.52.i386", "3AS:cups-1:1.1.17-13.3.52.ia64", "3AS:cups-1:1.1.17-13.3.52.ppc", "3AS:cups-1:1.1.17-13.3.52.s390", "3AS:cups-1:1.1.17-13.3.52.s390x", "3AS:cups-1:1.1.17-13.3.52.src", "3AS:cups-1:1.1.17-13.3.52.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3AS:cups-devel-1:1.1.17-13.3.52.i386", "3AS:cups-devel-1:1.1.17-13.3.52.ia64", "3AS:cups-devel-1:1.1.17-13.3.52.ppc", "3AS:cups-devel-1:1.1.17-13.3.52.s390", "3AS:cups-devel-1:1.1.17-13.3.52.s390x", "3AS:cups-devel-1:1.1.17-13.3.52.x86_64", "3AS:cups-libs-1:1.1.17-13.3.52.i386", "3AS:cups-libs-1:1.1.17-13.3.52.ia64", "3AS:cups-libs-1:1.1.17-13.3.52.ppc", "3AS:cups-libs-1:1.1.17-13.3.52.ppc64", "3AS:cups-libs-1:1.1.17-13.3.52.s390", "3AS:cups-libs-1:1.1.17-13.3.52.s390x", "3AS:cups-libs-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-1:1.1.17-13.3.52.i386", "3Desktop:cups-1:1.1.17-13.3.52.ia64", "3Desktop:cups-1:1.1.17-13.3.52.ppc", "3Desktop:cups-1:1.1.17-13.3.52.s390", "3Desktop:cups-1:1.1.17-13.3.52.s390x", "3Desktop:cups-1:1.1.17-13.3.52.src", "3Desktop:cups-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.52.i386", "3Desktop:cups-devel-1:1.1.17-13.3.52.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.52.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.52.i386", "3Desktop:cups-libs-1:1.1.17-13.3.52.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.52.x86_64", "3ES:cups-1:1.1.17-13.3.52.i386", "3ES:cups-1:1.1.17-13.3.52.ia64", "3ES:cups-1:1.1.17-13.3.52.ppc", "3ES:cups-1:1.1.17-13.3.52.s390", "3ES:cups-1:1.1.17-13.3.52.s390x", "3ES:cups-1:1.1.17-13.3.52.src", "3ES:cups-1:1.1.17-13.3.52.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3ES:cups-devel-1:1.1.17-13.3.52.i386", "3ES:cups-devel-1:1.1.17-13.3.52.ia64", "3ES:cups-devel-1:1.1.17-13.3.52.ppc", "3ES:cups-devel-1:1.1.17-13.3.52.s390", "3ES:cups-devel-1:1.1.17-13.3.52.s390x", "3ES:cups-devel-1:1.1.17-13.3.52.x86_64", "3ES:cups-libs-1:1.1.17-13.3.52.i386", "3ES:cups-libs-1:1.1.17-13.3.52.ia64", "3ES:cups-libs-1:1.1.17-13.3.52.ppc", "3ES:cups-libs-1:1.1.17-13.3.52.ppc64", "3ES:cups-libs-1:1.1.17-13.3.52.s390", "3ES:cups-libs-1:1.1.17-13.3.52.s390x", "3ES:cups-libs-1:1.1.17-13.3.52.x86_64", "3WS:cups-1:1.1.17-13.3.52.i386", "3WS:cups-1:1.1.17-13.3.52.ia64", "3WS:cups-1:1.1.17-13.3.52.ppc", "3WS:cups-1:1.1.17-13.3.52.s390", "3WS:cups-1:1.1.17-13.3.52.s390x", "3WS:cups-1:1.1.17-13.3.52.src", "3WS:cups-1:1.1.17-13.3.52.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3WS:cups-devel-1:1.1.17-13.3.52.i386", "3WS:cups-devel-1:1.1.17-13.3.52.ia64", "3WS:cups-devel-1:1.1.17-13.3.52.ppc", "3WS:cups-devel-1:1.1.17-13.3.52.s390", "3WS:cups-devel-1:1.1.17-13.3.52.s390x", "3WS:cups-devel-1:1.1.17-13.3.52.x86_64", "3WS:cups-libs-1:1.1.17-13.3.52.i386", "3WS:cups-libs-1:1.1.17-13.3.52.ia64", "3WS:cups-libs-1:1.1.17-13.3.52.ppc", "3WS:cups-libs-1:1.1.17-13.3.52.ppc64", "3WS:cups-libs-1:1.1.17-13.3.52.s390", "3WS:cups-libs-1:1.1.17-13.3.52.s390x", "3WS:cups-libs-1:1.1.17-13.3.52.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0206" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "3AS:cups-1:1.1.17-13.3.52.i386", "3AS:cups-1:1.1.17-13.3.52.ia64", "3AS:cups-1:1.1.17-13.3.52.ppc", "3AS:cups-1:1.1.17-13.3.52.s390", "3AS:cups-1:1.1.17-13.3.52.s390x", "3AS:cups-1:1.1.17-13.3.52.src", "3AS:cups-1:1.1.17-13.3.52.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3AS:cups-devel-1:1.1.17-13.3.52.i386", "3AS:cups-devel-1:1.1.17-13.3.52.ia64", "3AS:cups-devel-1:1.1.17-13.3.52.ppc", "3AS:cups-devel-1:1.1.17-13.3.52.s390", "3AS:cups-devel-1:1.1.17-13.3.52.s390x", "3AS:cups-devel-1:1.1.17-13.3.52.x86_64", "3AS:cups-libs-1:1.1.17-13.3.52.i386", "3AS:cups-libs-1:1.1.17-13.3.52.ia64", "3AS:cups-libs-1:1.1.17-13.3.52.ppc", "3AS:cups-libs-1:1.1.17-13.3.52.ppc64", "3AS:cups-libs-1:1.1.17-13.3.52.s390", "3AS:cups-libs-1:1.1.17-13.3.52.s390x", "3AS:cups-libs-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-1:1.1.17-13.3.52.i386", "3Desktop:cups-1:1.1.17-13.3.52.ia64", "3Desktop:cups-1:1.1.17-13.3.52.ppc", "3Desktop:cups-1:1.1.17-13.3.52.s390", "3Desktop:cups-1:1.1.17-13.3.52.s390x", "3Desktop:cups-1:1.1.17-13.3.52.src", "3Desktop:cups-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.52.i386", "3Desktop:cups-devel-1:1.1.17-13.3.52.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.52.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.52.i386", "3Desktop:cups-libs-1:1.1.17-13.3.52.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.52.x86_64", "3ES:cups-1:1.1.17-13.3.52.i386", "3ES:cups-1:1.1.17-13.3.52.ia64", "3ES:cups-1:1.1.17-13.3.52.ppc", "3ES:cups-1:1.1.17-13.3.52.s390", "3ES:cups-1:1.1.17-13.3.52.s390x", "3ES:cups-1:1.1.17-13.3.52.src", "3ES:cups-1:1.1.17-13.3.52.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3ES:cups-devel-1:1.1.17-13.3.52.i386", "3ES:cups-devel-1:1.1.17-13.3.52.ia64", "3ES:cups-devel-1:1.1.17-13.3.52.ppc", "3ES:cups-devel-1:1.1.17-13.3.52.s390", "3ES:cups-devel-1:1.1.17-13.3.52.s390x", "3ES:cups-devel-1:1.1.17-13.3.52.x86_64", "3ES:cups-libs-1:1.1.17-13.3.52.i386", "3ES:cups-libs-1:1.1.17-13.3.52.ia64", "3ES:cups-libs-1:1.1.17-13.3.52.ppc", "3ES:cups-libs-1:1.1.17-13.3.52.ppc64", "3ES:cups-libs-1:1.1.17-13.3.52.s390", "3ES:cups-libs-1:1.1.17-13.3.52.s390x", "3ES:cups-libs-1:1.1.17-13.3.52.x86_64", "3WS:cups-1:1.1.17-13.3.52.i386", "3WS:cups-1:1.1.17-13.3.52.ia64", "3WS:cups-1:1.1.17-13.3.52.ppc", "3WS:cups-1:1.1.17-13.3.52.s390", "3WS:cups-1:1.1.17-13.3.52.s390x", "3WS:cups-1:1.1.17-13.3.52.src", "3WS:cups-1:1.1.17-13.3.52.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3WS:cups-devel-1:1.1.17-13.3.52.i386", "3WS:cups-devel-1:1.1.17-13.3.52.ia64", "3WS:cups-devel-1:1.1.17-13.3.52.ppc", "3WS:cups-devel-1:1.1.17-13.3.52.s390", "3WS:cups-devel-1:1.1.17-13.3.52.s390x", "3WS:cups-devel-1:1.1.17-13.3.52.x86_64", "3WS:cups-libs-1:1.1.17-13.3.52.i386", "3WS:cups-libs-1:1.1.17-13.3.52.ia64", "3WS:cups-libs-1:1.1.17-13.3.52.ppc", "3WS:cups-libs-1:1.1.17-13.3.52.ppc64", "3WS:cups-libs-1:1.1.17-13.3.52.s390", "3WS:cups-libs-1:1.1.17-13.3.52.s390x", "3WS:cups-libs-1:1.1.17-13.3.52.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cups: buffer overflows in HP-GL/2 filter" }, { "cve": "CVE-2008-1373", "discovery_date": "2008-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "438303" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: overflow in gif image filter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:cups-1:1.1.17-13.3.52.i386", "3AS:cups-1:1.1.17-13.3.52.ia64", "3AS:cups-1:1.1.17-13.3.52.ppc", "3AS:cups-1:1.1.17-13.3.52.s390", "3AS:cups-1:1.1.17-13.3.52.s390x", "3AS:cups-1:1.1.17-13.3.52.src", "3AS:cups-1:1.1.17-13.3.52.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3AS:cups-devel-1:1.1.17-13.3.52.i386", "3AS:cups-devel-1:1.1.17-13.3.52.ia64", "3AS:cups-devel-1:1.1.17-13.3.52.ppc", "3AS:cups-devel-1:1.1.17-13.3.52.s390", "3AS:cups-devel-1:1.1.17-13.3.52.s390x", "3AS:cups-devel-1:1.1.17-13.3.52.x86_64", "3AS:cups-libs-1:1.1.17-13.3.52.i386", "3AS:cups-libs-1:1.1.17-13.3.52.ia64", "3AS:cups-libs-1:1.1.17-13.3.52.ppc", "3AS:cups-libs-1:1.1.17-13.3.52.ppc64", "3AS:cups-libs-1:1.1.17-13.3.52.s390", "3AS:cups-libs-1:1.1.17-13.3.52.s390x", "3AS:cups-libs-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-1:1.1.17-13.3.52.i386", "3Desktop:cups-1:1.1.17-13.3.52.ia64", "3Desktop:cups-1:1.1.17-13.3.52.ppc", "3Desktop:cups-1:1.1.17-13.3.52.s390", "3Desktop:cups-1:1.1.17-13.3.52.s390x", "3Desktop:cups-1:1.1.17-13.3.52.src", "3Desktop:cups-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.52.i386", "3Desktop:cups-devel-1:1.1.17-13.3.52.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.52.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.52.i386", "3Desktop:cups-libs-1:1.1.17-13.3.52.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.52.x86_64", "3ES:cups-1:1.1.17-13.3.52.i386", "3ES:cups-1:1.1.17-13.3.52.ia64", "3ES:cups-1:1.1.17-13.3.52.ppc", "3ES:cups-1:1.1.17-13.3.52.s390", "3ES:cups-1:1.1.17-13.3.52.s390x", "3ES:cups-1:1.1.17-13.3.52.src", "3ES:cups-1:1.1.17-13.3.52.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3ES:cups-devel-1:1.1.17-13.3.52.i386", "3ES:cups-devel-1:1.1.17-13.3.52.ia64", "3ES:cups-devel-1:1.1.17-13.3.52.ppc", "3ES:cups-devel-1:1.1.17-13.3.52.s390", "3ES:cups-devel-1:1.1.17-13.3.52.s390x", "3ES:cups-devel-1:1.1.17-13.3.52.x86_64", "3ES:cups-libs-1:1.1.17-13.3.52.i386", "3ES:cups-libs-1:1.1.17-13.3.52.ia64", "3ES:cups-libs-1:1.1.17-13.3.52.ppc", "3ES:cups-libs-1:1.1.17-13.3.52.ppc64", "3ES:cups-libs-1:1.1.17-13.3.52.s390", "3ES:cups-libs-1:1.1.17-13.3.52.s390x", "3ES:cups-libs-1:1.1.17-13.3.52.x86_64", "3WS:cups-1:1.1.17-13.3.52.i386", "3WS:cups-1:1.1.17-13.3.52.ia64", "3WS:cups-1:1.1.17-13.3.52.ppc", "3WS:cups-1:1.1.17-13.3.52.s390", "3WS:cups-1:1.1.17-13.3.52.s390x", "3WS:cups-1:1.1.17-13.3.52.src", "3WS:cups-1:1.1.17-13.3.52.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3WS:cups-devel-1:1.1.17-13.3.52.i386", "3WS:cups-devel-1:1.1.17-13.3.52.ia64", "3WS:cups-devel-1:1.1.17-13.3.52.ppc", "3WS:cups-devel-1:1.1.17-13.3.52.s390", "3WS:cups-devel-1:1.1.17-13.3.52.s390x", "3WS:cups-devel-1:1.1.17-13.3.52.x86_64", "3WS:cups-libs-1:1.1.17-13.3.52.i386", "3WS:cups-libs-1:1.1.17-13.3.52.ia64", "3WS:cups-libs-1:1.1.17-13.3.52.ppc", "3WS:cups-libs-1:1.1.17-13.3.52.ppc64", "3WS:cups-libs-1:1.1.17-13.3.52.s390", "3WS:cups-libs-1:1.1.17-13.3.52.s390x", "3WS:cups-libs-1:1.1.17-13.3.52.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1373" }, { "category": "external", "summary": "RHBZ#438303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438303" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1373", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1373" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1373", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1373" } ], "release_date": "2008-04-01T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-04-01T14:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:cups-1:1.1.17-13.3.52.i386", "3AS:cups-1:1.1.17-13.3.52.ia64", "3AS:cups-1:1.1.17-13.3.52.ppc", "3AS:cups-1:1.1.17-13.3.52.s390", "3AS:cups-1:1.1.17-13.3.52.s390x", "3AS:cups-1:1.1.17-13.3.52.src", "3AS:cups-1:1.1.17-13.3.52.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3AS:cups-devel-1:1.1.17-13.3.52.i386", "3AS:cups-devel-1:1.1.17-13.3.52.ia64", "3AS:cups-devel-1:1.1.17-13.3.52.ppc", "3AS:cups-devel-1:1.1.17-13.3.52.s390", "3AS:cups-devel-1:1.1.17-13.3.52.s390x", "3AS:cups-devel-1:1.1.17-13.3.52.x86_64", "3AS:cups-libs-1:1.1.17-13.3.52.i386", "3AS:cups-libs-1:1.1.17-13.3.52.ia64", "3AS:cups-libs-1:1.1.17-13.3.52.ppc", "3AS:cups-libs-1:1.1.17-13.3.52.ppc64", "3AS:cups-libs-1:1.1.17-13.3.52.s390", "3AS:cups-libs-1:1.1.17-13.3.52.s390x", "3AS:cups-libs-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-1:1.1.17-13.3.52.i386", "3Desktop:cups-1:1.1.17-13.3.52.ia64", "3Desktop:cups-1:1.1.17-13.3.52.ppc", "3Desktop:cups-1:1.1.17-13.3.52.s390", "3Desktop:cups-1:1.1.17-13.3.52.s390x", "3Desktop:cups-1:1.1.17-13.3.52.src", "3Desktop:cups-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.52.i386", "3Desktop:cups-devel-1:1.1.17-13.3.52.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.52.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.52.i386", "3Desktop:cups-libs-1:1.1.17-13.3.52.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.52.x86_64", "3ES:cups-1:1.1.17-13.3.52.i386", "3ES:cups-1:1.1.17-13.3.52.ia64", "3ES:cups-1:1.1.17-13.3.52.ppc", "3ES:cups-1:1.1.17-13.3.52.s390", "3ES:cups-1:1.1.17-13.3.52.s390x", "3ES:cups-1:1.1.17-13.3.52.src", "3ES:cups-1:1.1.17-13.3.52.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3ES:cups-devel-1:1.1.17-13.3.52.i386", "3ES:cups-devel-1:1.1.17-13.3.52.ia64", "3ES:cups-devel-1:1.1.17-13.3.52.ppc", "3ES:cups-devel-1:1.1.17-13.3.52.s390", "3ES:cups-devel-1:1.1.17-13.3.52.s390x", "3ES:cups-devel-1:1.1.17-13.3.52.x86_64", "3ES:cups-libs-1:1.1.17-13.3.52.i386", "3ES:cups-libs-1:1.1.17-13.3.52.ia64", "3ES:cups-libs-1:1.1.17-13.3.52.ppc", "3ES:cups-libs-1:1.1.17-13.3.52.ppc64", "3ES:cups-libs-1:1.1.17-13.3.52.s390", "3ES:cups-libs-1:1.1.17-13.3.52.s390x", "3ES:cups-libs-1:1.1.17-13.3.52.x86_64", "3WS:cups-1:1.1.17-13.3.52.i386", "3WS:cups-1:1.1.17-13.3.52.ia64", "3WS:cups-1:1.1.17-13.3.52.ppc", "3WS:cups-1:1.1.17-13.3.52.s390", "3WS:cups-1:1.1.17-13.3.52.s390x", "3WS:cups-1:1.1.17-13.3.52.src", "3WS:cups-1:1.1.17-13.3.52.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3WS:cups-devel-1:1.1.17-13.3.52.i386", "3WS:cups-devel-1:1.1.17-13.3.52.ia64", "3WS:cups-devel-1:1.1.17-13.3.52.ppc", "3WS:cups-devel-1:1.1.17-13.3.52.s390", "3WS:cups-devel-1:1.1.17-13.3.52.s390x", "3WS:cups-devel-1:1.1.17-13.3.52.x86_64", "3WS:cups-libs-1:1.1.17-13.3.52.i386", "3WS:cups-libs-1:1.1.17-13.3.52.ia64", "3WS:cups-libs-1:1.1.17-13.3.52.ppc", "3WS:cups-libs-1:1.1.17-13.3.52.ppc64", "3WS:cups-libs-1:1.1.17-13.3.52.s390", "3WS:cups-libs-1:1.1.17-13.3.52.s390x", "3WS:cups-libs-1:1.1.17-13.3.52.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0206" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "3AS:cups-1:1.1.17-13.3.52.i386", "3AS:cups-1:1.1.17-13.3.52.ia64", "3AS:cups-1:1.1.17-13.3.52.ppc", "3AS:cups-1:1.1.17-13.3.52.s390", "3AS:cups-1:1.1.17-13.3.52.s390x", "3AS:cups-1:1.1.17-13.3.52.src", "3AS:cups-1:1.1.17-13.3.52.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3AS:cups-devel-1:1.1.17-13.3.52.i386", "3AS:cups-devel-1:1.1.17-13.3.52.ia64", "3AS:cups-devel-1:1.1.17-13.3.52.ppc", "3AS:cups-devel-1:1.1.17-13.3.52.s390", "3AS:cups-devel-1:1.1.17-13.3.52.s390x", "3AS:cups-devel-1:1.1.17-13.3.52.x86_64", "3AS:cups-libs-1:1.1.17-13.3.52.i386", "3AS:cups-libs-1:1.1.17-13.3.52.ia64", "3AS:cups-libs-1:1.1.17-13.3.52.ppc", "3AS:cups-libs-1:1.1.17-13.3.52.ppc64", "3AS:cups-libs-1:1.1.17-13.3.52.s390", "3AS:cups-libs-1:1.1.17-13.3.52.s390x", "3AS:cups-libs-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-1:1.1.17-13.3.52.i386", "3Desktop:cups-1:1.1.17-13.3.52.ia64", "3Desktop:cups-1:1.1.17-13.3.52.ppc", "3Desktop:cups-1:1.1.17-13.3.52.s390", "3Desktop:cups-1:1.1.17-13.3.52.s390x", "3Desktop:cups-1:1.1.17-13.3.52.src", "3Desktop:cups-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.52.i386", "3Desktop:cups-devel-1:1.1.17-13.3.52.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.52.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.52.i386", "3Desktop:cups-libs-1:1.1.17-13.3.52.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.52.x86_64", "3ES:cups-1:1.1.17-13.3.52.i386", "3ES:cups-1:1.1.17-13.3.52.ia64", "3ES:cups-1:1.1.17-13.3.52.ppc", "3ES:cups-1:1.1.17-13.3.52.s390", "3ES:cups-1:1.1.17-13.3.52.s390x", "3ES:cups-1:1.1.17-13.3.52.src", "3ES:cups-1:1.1.17-13.3.52.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3ES:cups-devel-1:1.1.17-13.3.52.i386", "3ES:cups-devel-1:1.1.17-13.3.52.ia64", "3ES:cups-devel-1:1.1.17-13.3.52.ppc", "3ES:cups-devel-1:1.1.17-13.3.52.s390", "3ES:cups-devel-1:1.1.17-13.3.52.s390x", "3ES:cups-devel-1:1.1.17-13.3.52.x86_64", "3ES:cups-libs-1:1.1.17-13.3.52.i386", "3ES:cups-libs-1:1.1.17-13.3.52.ia64", "3ES:cups-libs-1:1.1.17-13.3.52.ppc", "3ES:cups-libs-1:1.1.17-13.3.52.ppc64", "3ES:cups-libs-1:1.1.17-13.3.52.s390", "3ES:cups-libs-1:1.1.17-13.3.52.s390x", "3ES:cups-libs-1:1.1.17-13.3.52.x86_64", "3WS:cups-1:1.1.17-13.3.52.i386", "3WS:cups-1:1.1.17-13.3.52.ia64", "3WS:cups-1:1.1.17-13.3.52.ppc", "3WS:cups-1:1.1.17-13.3.52.s390", "3WS:cups-1:1.1.17-13.3.52.s390x", "3WS:cups-1:1.1.17-13.3.52.src", "3WS:cups-1:1.1.17-13.3.52.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3WS:cups-devel-1:1.1.17-13.3.52.i386", "3WS:cups-devel-1:1.1.17-13.3.52.ia64", "3WS:cups-devel-1:1.1.17-13.3.52.ppc", "3WS:cups-devel-1:1.1.17-13.3.52.s390", "3WS:cups-devel-1:1.1.17-13.3.52.s390x", "3WS:cups-devel-1:1.1.17-13.3.52.x86_64", "3WS:cups-libs-1:1.1.17-13.3.52.i386", "3WS:cups-libs-1:1.1.17-13.3.52.ia64", "3WS:cups-libs-1:1.1.17-13.3.52.ppc", "3WS:cups-libs-1:1.1.17-13.3.52.ppc64", "3WS:cups-libs-1:1.1.17-13.3.52.s390", "3WS:cups-libs-1:1.1.17-13.3.52.s390x", "3WS:cups-libs-1:1.1.17-13.3.52.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cups: overflow in gif image filter" }, { "cve": "CVE-2008-1374", "discovery_date": "2008-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "438336" } ], "notes": [ { "category": "description", "text": "Integer overflow in pdftops filter in CUPS in Red Hat Enterprise Linux 3 and 4, when running on 64-bit platforms, allows remote attackers to execute arbitrary code via a crafted PDF file. NOTE: this issue is due to an incomplete fix for CVE-2004-0888.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: incomplete fix for CVE-2004-0888 / CVE-2005-0206", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:cups-1:1.1.17-13.3.52.i386", "3AS:cups-1:1.1.17-13.3.52.ia64", "3AS:cups-1:1.1.17-13.3.52.ppc", "3AS:cups-1:1.1.17-13.3.52.s390", "3AS:cups-1:1.1.17-13.3.52.s390x", "3AS:cups-1:1.1.17-13.3.52.src", "3AS:cups-1:1.1.17-13.3.52.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3AS:cups-devel-1:1.1.17-13.3.52.i386", "3AS:cups-devel-1:1.1.17-13.3.52.ia64", "3AS:cups-devel-1:1.1.17-13.3.52.ppc", "3AS:cups-devel-1:1.1.17-13.3.52.s390", "3AS:cups-devel-1:1.1.17-13.3.52.s390x", "3AS:cups-devel-1:1.1.17-13.3.52.x86_64", "3AS:cups-libs-1:1.1.17-13.3.52.i386", "3AS:cups-libs-1:1.1.17-13.3.52.ia64", "3AS:cups-libs-1:1.1.17-13.3.52.ppc", "3AS:cups-libs-1:1.1.17-13.3.52.ppc64", "3AS:cups-libs-1:1.1.17-13.3.52.s390", "3AS:cups-libs-1:1.1.17-13.3.52.s390x", "3AS:cups-libs-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-1:1.1.17-13.3.52.i386", "3Desktop:cups-1:1.1.17-13.3.52.ia64", "3Desktop:cups-1:1.1.17-13.3.52.ppc", "3Desktop:cups-1:1.1.17-13.3.52.s390", "3Desktop:cups-1:1.1.17-13.3.52.s390x", "3Desktop:cups-1:1.1.17-13.3.52.src", "3Desktop:cups-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.52.i386", "3Desktop:cups-devel-1:1.1.17-13.3.52.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.52.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.52.i386", "3Desktop:cups-libs-1:1.1.17-13.3.52.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.52.x86_64", "3ES:cups-1:1.1.17-13.3.52.i386", "3ES:cups-1:1.1.17-13.3.52.ia64", "3ES:cups-1:1.1.17-13.3.52.ppc", "3ES:cups-1:1.1.17-13.3.52.s390", "3ES:cups-1:1.1.17-13.3.52.s390x", "3ES:cups-1:1.1.17-13.3.52.src", "3ES:cups-1:1.1.17-13.3.52.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3ES:cups-devel-1:1.1.17-13.3.52.i386", "3ES:cups-devel-1:1.1.17-13.3.52.ia64", "3ES:cups-devel-1:1.1.17-13.3.52.ppc", "3ES:cups-devel-1:1.1.17-13.3.52.s390", "3ES:cups-devel-1:1.1.17-13.3.52.s390x", "3ES:cups-devel-1:1.1.17-13.3.52.x86_64", "3ES:cups-libs-1:1.1.17-13.3.52.i386", "3ES:cups-libs-1:1.1.17-13.3.52.ia64", "3ES:cups-libs-1:1.1.17-13.3.52.ppc", "3ES:cups-libs-1:1.1.17-13.3.52.ppc64", "3ES:cups-libs-1:1.1.17-13.3.52.s390", "3ES:cups-libs-1:1.1.17-13.3.52.s390x", "3ES:cups-libs-1:1.1.17-13.3.52.x86_64", "3WS:cups-1:1.1.17-13.3.52.i386", "3WS:cups-1:1.1.17-13.3.52.ia64", "3WS:cups-1:1.1.17-13.3.52.ppc", "3WS:cups-1:1.1.17-13.3.52.s390", "3WS:cups-1:1.1.17-13.3.52.s390x", "3WS:cups-1:1.1.17-13.3.52.src", "3WS:cups-1:1.1.17-13.3.52.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3WS:cups-devel-1:1.1.17-13.3.52.i386", "3WS:cups-devel-1:1.1.17-13.3.52.ia64", "3WS:cups-devel-1:1.1.17-13.3.52.ppc", "3WS:cups-devel-1:1.1.17-13.3.52.s390", "3WS:cups-devel-1:1.1.17-13.3.52.s390x", "3WS:cups-devel-1:1.1.17-13.3.52.x86_64", "3WS:cups-libs-1:1.1.17-13.3.52.i386", "3WS:cups-libs-1:1.1.17-13.3.52.ia64", "3WS:cups-libs-1:1.1.17-13.3.52.ppc", "3WS:cups-libs-1:1.1.17-13.3.52.ppc64", "3WS:cups-libs-1:1.1.17-13.3.52.s390", "3WS:cups-libs-1:1.1.17-13.3.52.s390x", "3WS:cups-libs-1:1.1.17-13.3.52.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1374" }, { "category": "external", "summary": "RHBZ#438336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1374", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1374" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1374", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1374" } ], "release_date": "2008-04-01T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-04-01T14:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:cups-1:1.1.17-13.3.52.i386", "3AS:cups-1:1.1.17-13.3.52.ia64", "3AS:cups-1:1.1.17-13.3.52.ppc", "3AS:cups-1:1.1.17-13.3.52.s390", "3AS:cups-1:1.1.17-13.3.52.s390x", "3AS:cups-1:1.1.17-13.3.52.src", "3AS:cups-1:1.1.17-13.3.52.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3AS:cups-devel-1:1.1.17-13.3.52.i386", "3AS:cups-devel-1:1.1.17-13.3.52.ia64", "3AS:cups-devel-1:1.1.17-13.3.52.ppc", "3AS:cups-devel-1:1.1.17-13.3.52.s390", "3AS:cups-devel-1:1.1.17-13.3.52.s390x", "3AS:cups-devel-1:1.1.17-13.3.52.x86_64", "3AS:cups-libs-1:1.1.17-13.3.52.i386", "3AS:cups-libs-1:1.1.17-13.3.52.ia64", "3AS:cups-libs-1:1.1.17-13.3.52.ppc", "3AS:cups-libs-1:1.1.17-13.3.52.ppc64", "3AS:cups-libs-1:1.1.17-13.3.52.s390", "3AS:cups-libs-1:1.1.17-13.3.52.s390x", "3AS:cups-libs-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-1:1.1.17-13.3.52.i386", "3Desktop:cups-1:1.1.17-13.3.52.ia64", "3Desktop:cups-1:1.1.17-13.3.52.ppc", "3Desktop:cups-1:1.1.17-13.3.52.s390", "3Desktop:cups-1:1.1.17-13.3.52.s390x", "3Desktop:cups-1:1.1.17-13.3.52.src", "3Desktop:cups-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.52.i386", "3Desktop:cups-devel-1:1.1.17-13.3.52.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.52.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.52.i386", "3Desktop:cups-libs-1:1.1.17-13.3.52.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.52.x86_64", "3ES:cups-1:1.1.17-13.3.52.i386", "3ES:cups-1:1.1.17-13.3.52.ia64", "3ES:cups-1:1.1.17-13.3.52.ppc", "3ES:cups-1:1.1.17-13.3.52.s390", "3ES:cups-1:1.1.17-13.3.52.s390x", "3ES:cups-1:1.1.17-13.3.52.src", "3ES:cups-1:1.1.17-13.3.52.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3ES:cups-devel-1:1.1.17-13.3.52.i386", "3ES:cups-devel-1:1.1.17-13.3.52.ia64", "3ES:cups-devel-1:1.1.17-13.3.52.ppc", "3ES:cups-devel-1:1.1.17-13.3.52.s390", "3ES:cups-devel-1:1.1.17-13.3.52.s390x", "3ES:cups-devel-1:1.1.17-13.3.52.x86_64", "3ES:cups-libs-1:1.1.17-13.3.52.i386", "3ES:cups-libs-1:1.1.17-13.3.52.ia64", "3ES:cups-libs-1:1.1.17-13.3.52.ppc", "3ES:cups-libs-1:1.1.17-13.3.52.ppc64", "3ES:cups-libs-1:1.1.17-13.3.52.s390", "3ES:cups-libs-1:1.1.17-13.3.52.s390x", "3ES:cups-libs-1:1.1.17-13.3.52.x86_64", "3WS:cups-1:1.1.17-13.3.52.i386", "3WS:cups-1:1.1.17-13.3.52.ia64", "3WS:cups-1:1.1.17-13.3.52.ppc", "3WS:cups-1:1.1.17-13.3.52.s390", "3WS:cups-1:1.1.17-13.3.52.s390x", "3WS:cups-1:1.1.17-13.3.52.src", "3WS:cups-1:1.1.17-13.3.52.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3WS:cups-devel-1:1.1.17-13.3.52.i386", "3WS:cups-devel-1:1.1.17-13.3.52.ia64", "3WS:cups-devel-1:1.1.17-13.3.52.ppc", "3WS:cups-devel-1:1.1.17-13.3.52.s390", "3WS:cups-devel-1:1.1.17-13.3.52.s390x", "3WS:cups-devel-1:1.1.17-13.3.52.x86_64", "3WS:cups-libs-1:1.1.17-13.3.52.i386", "3WS:cups-libs-1:1.1.17-13.3.52.ia64", "3WS:cups-libs-1:1.1.17-13.3.52.ppc", "3WS:cups-libs-1:1.1.17-13.3.52.ppc64", "3WS:cups-libs-1:1.1.17-13.3.52.s390", "3WS:cups-libs-1:1.1.17-13.3.52.s390x", "3WS:cups-libs-1:1.1.17-13.3.52.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0206" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "3AS:cups-1:1.1.17-13.3.52.i386", "3AS:cups-1:1.1.17-13.3.52.ia64", "3AS:cups-1:1.1.17-13.3.52.ppc", "3AS:cups-1:1.1.17-13.3.52.s390", "3AS:cups-1:1.1.17-13.3.52.s390x", "3AS:cups-1:1.1.17-13.3.52.src", "3AS:cups-1:1.1.17-13.3.52.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3AS:cups-devel-1:1.1.17-13.3.52.i386", "3AS:cups-devel-1:1.1.17-13.3.52.ia64", "3AS:cups-devel-1:1.1.17-13.3.52.ppc", "3AS:cups-devel-1:1.1.17-13.3.52.s390", "3AS:cups-devel-1:1.1.17-13.3.52.s390x", "3AS:cups-devel-1:1.1.17-13.3.52.x86_64", "3AS:cups-libs-1:1.1.17-13.3.52.i386", "3AS:cups-libs-1:1.1.17-13.3.52.ia64", "3AS:cups-libs-1:1.1.17-13.3.52.ppc", "3AS:cups-libs-1:1.1.17-13.3.52.ppc64", "3AS:cups-libs-1:1.1.17-13.3.52.s390", "3AS:cups-libs-1:1.1.17-13.3.52.s390x", "3AS:cups-libs-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-1:1.1.17-13.3.52.i386", "3Desktop:cups-1:1.1.17-13.3.52.ia64", "3Desktop:cups-1:1.1.17-13.3.52.ppc", "3Desktop:cups-1:1.1.17-13.3.52.s390", "3Desktop:cups-1:1.1.17-13.3.52.s390x", "3Desktop:cups-1:1.1.17-13.3.52.src", "3Desktop:cups-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.52.i386", "3Desktop:cups-devel-1:1.1.17-13.3.52.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.52.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390", "3Desktop:cups-devel-1:1.1.17-13.3.52.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.52.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.52.i386", "3Desktop:cups-libs-1:1.1.17-13.3.52.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.52.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390", "3Desktop:cups-libs-1:1.1.17-13.3.52.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.52.x86_64", "3ES:cups-1:1.1.17-13.3.52.i386", "3ES:cups-1:1.1.17-13.3.52.ia64", "3ES:cups-1:1.1.17-13.3.52.ppc", "3ES:cups-1:1.1.17-13.3.52.s390", "3ES:cups-1:1.1.17-13.3.52.s390x", "3ES:cups-1:1.1.17-13.3.52.src", "3ES:cups-1:1.1.17-13.3.52.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3ES:cups-devel-1:1.1.17-13.3.52.i386", "3ES:cups-devel-1:1.1.17-13.3.52.ia64", "3ES:cups-devel-1:1.1.17-13.3.52.ppc", "3ES:cups-devel-1:1.1.17-13.3.52.s390", "3ES:cups-devel-1:1.1.17-13.3.52.s390x", "3ES:cups-devel-1:1.1.17-13.3.52.x86_64", "3ES:cups-libs-1:1.1.17-13.3.52.i386", "3ES:cups-libs-1:1.1.17-13.3.52.ia64", "3ES:cups-libs-1:1.1.17-13.3.52.ppc", "3ES:cups-libs-1:1.1.17-13.3.52.ppc64", "3ES:cups-libs-1:1.1.17-13.3.52.s390", "3ES:cups-libs-1:1.1.17-13.3.52.s390x", "3ES:cups-libs-1:1.1.17-13.3.52.x86_64", "3WS:cups-1:1.1.17-13.3.52.i386", "3WS:cups-1:1.1.17-13.3.52.ia64", "3WS:cups-1:1.1.17-13.3.52.ppc", "3WS:cups-1:1.1.17-13.3.52.s390", "3WS:cups-1:1.1.17-13.3.52.s390x", "3WS:cups-1:1.1.17-13.3.52.src", "3WS:cups-1:1.1.17-13.3.52.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.52.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.52.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.52.x86_64", "3WS:cups-devel-1:1.1.17-13.3.52.i386", "3WS:cups-devel-1:1.1.17-13.3.52.ia64", "3WS:cups-devel-1:1.1.17-13.3.52.ppc", "3WS:cups-devel-1:1.1.17-13.3.52.s390", "3WS:cups-devel-1:1.1.17-13.3.52.s390x", "3WS:cups-devel-1:1.1.17-13.3.52.x86_64", "3WS:cups-libs-1:1.1.17-13.3.52.i386", "3WS:cups-libs-1:1.1.17-13.3.52.ia64", "3WS:cups-libs-1:1.1.17-13.3.52.ppc", "3WS:cups-libs-1:1.1.17-13.3.52.ppc64", "3WS:cups-libs-1:1.1.17-13.3.52.s390", "3WS:cups-libs-1:1.1.17-13.3.52.s390x", "3WS:cups-libs-1:1.1.17-13.3.52.x86_64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4AS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4ES:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.src", "4WS:cups-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.el4_6.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cups: incomplete fix for CVE-2004-0888 / CVE-2005-0206" } ] }
rhsa-2008:0192
Vulnerability from csaf_redhat
Published
2008-04-01 14:10
Modified
2024-11-22 01:53
Summary
Red Hat Security Advisory: cups security update
Notes
Topic
Updated cups packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The Common UNIX Printing System (CUPS) provides a portable printing layer
for UNIX(R) operating systems.
A heap buffer overflow flaw was found in a CUPS administration interface
CGI script. A local attacker able to connect to the IPP port (TCP port 631)
could send a malicious request causing the script to crash or, potentially,
execute arbitrary code as the "lp" user. Please note: the default CUPS
configuration in Red Hat Enterprise Linux 5 does not allow remote
connections to the IPP TCP port. (CVE-2008-0047)
Red Hat would like to thank "regenrecht" for reporting this issue.
This issue did not affect the versions of CUPS as shipped with Red Hat
Enterprise Linux 3 or 4.
Two overflows were discovered in the HP-GL/2-to-PostScript filter. An
attacker could create a malicious HP-GL/2 file that could possibly execute
arbitrary code as the "lp" user if the file is printed. (CVE-2008-0053)
A buffer overflow flaw was discovered in the GIF decoding routines used by
CUPS image converting filters "imagetops" and "imagetoraster". An attacker
could create a malicious GIF file that could possibly execute arbitrary
code as the "lp" user if the file was printed. (CVE-2008-1373)
All cups users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated cups packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Common UNIX Printing System (CUPS) provides a portable printing layer\nfor UNIX(R) operating systems.\n\nA heap buffer overflow flaw was found in a CUPS administration interface\nCGI script. A local attacker able to connect to the IPP port (TCP port 631)\ncould send a malicious request causing the script to crash or, potentially,\nexecute arbitrary code as the \"lp\" user. Please note: the default CUPS\nconfiguration in Red Hat Enterprise Linux 5 does not allow remote\nconnections to the IPP TCP port. (CVE-2008-0047)\n\nRed Hat would like to thank \"regenrecht\" for reporting this issue.\n\nThis issue did not affect the versions of CUPS as shipped with Red Hat\nEnterprise Linux 3 or 4.\n\nTwo overflows were discovered in the HP-GL/2-to-PostScript filter. An\nattacker could create a malicious HP-GL/2 file that could possibly execute\narbitrary code as the \"lp\" user if the file is printed. (CVE-2008-0053)\n\nA buffer overflow flaw was discovered in the GIF decoding routines used by\nCUPS image converting filters \"imagetops\" and \"imagetoraster\". An attacker\ncould create a malicious GIF file that could possibly execute arbitrary\ncode as the \"lp\" user if the file was printed. (CVE-2008-1373)\n\nAll cups users are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0192", "url": "https://access.redhat.com/errata/RHSA-2008:0192" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "436153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436153" }, { "category": "external", "summary": "438117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438117" }, { "category": "external", "summary": "438303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438303" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0192.json" } ], "title": "Red Hat Security Advisory: cups security update", "tracking": { "current_release_date": "2024-11-22T01:53:11+00:00", "generator": { "date": "2024-11-22T01:53:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0192", "initial_release_date": "2008-04-01T14:10:00+00:00", "revision_history": [ { "date": "2008-04-01T14:10:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-04-01T10:10:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:53:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.2.4-11.14.el5_1.6.src", "product": { "name": "cups-1:1.2.4-11.14.el5_1.6.src", "product_id": "cups-1:1.2.4-11.14.el5_1.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.2.4-11.14.el5_1.6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "product": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "product_id": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.14.el5_1.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "product": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "product_id": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.14.el5_1.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.2.4-11.14.el5_1.6.x86_64", "product": { "name": "cups-1:1.2.4-11.14.el5_1.6.x86_64", "product_id": "cups-1:1.2.4-11.14.el5_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.2.4-11.14.el5_1.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "product": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "product_id": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.14.el5_1.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "product": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "product_id": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-lpd@1.2.4-11.14.el5_1.6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-devel-1:1.2.4-11.14.el5_1.6.i386", "product": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.i386", "product_id": "cups-devel-1:1.2.4-11.14.el5_1.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.14.el5_1.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "product": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "product_id": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.14.el5_1.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.2.4-11.14.el5_1.6.i386", "product": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.i386", "product_id": "cups-libs-1:1.2.4-11.14.el5_1.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.14.el5_1.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.2.4-11.14.el5_1.6.i386", "product": { "name": "cups-1:1.2.4-11.14.el5_1.6.i386", "product_id": "cups-1:1.2.4-11.14.el5_1.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.2.4-11.14.el5_1.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "product": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "product_id": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-lpd@1.2.4-11.14.el5_1.6?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.2.4-11.14.el5_1.6.ia64", "product": { "name": "cups-1:1.2.4-11.14.el5_1.6.ia64", "product_id": "cups-1:1.2.4-11.14.el5_1.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.2.4-11.14.el5_1.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "product": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "product_id": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.14.el5_1.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "product": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "product_id": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-lpd@1.2.4-11.14.el5_1.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "product": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "product_id": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.14.el5_1.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "product": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "product_id": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.14.el5_1.6?arch=ia64\u0026epoch=1" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.2.4-11.14.el5_1.6.ppc", "product": { "name": "cups-1:1.2.4-11.14.el5_1.6.ppc", "product_id": "cups-1:1.2.4-11.14.el5_1.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.2.4-11.14.el5_1.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "product": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "product_id": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.14.el5_1.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "product": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "product_id": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-lpd@1.2.4-11.14.el5_1.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "product": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "product_id": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.14.el5_1.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "product": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "product_id": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.14.el5_1.6?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "product": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "product_id": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.14.el5_1.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "product": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "product_id": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.14.el5_1.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "product": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "product_id": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.14.el5_1.6?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.2.4-11.14.el5_1.6.s390x", "product": { "name": "cups-1:1.2.4-11.14.el5_1.6.s390x", "product_id": "cups-1:1.2.4-11.14.el5_1.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.2.4-11.14.el5_1.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "product": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "product_id": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.14.el5_1.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "product": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "product_id": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-lpd@1.2.4-11.14.el5_1.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "product": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "product_id": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.14.el5_1.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "product": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "product_id": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.14.el5_1.6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390", "product": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390", "product_id": "cups-libs-1:1.2.4-11.14.el5_1.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.14.el5_1.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390", "product": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390", "product_id": "cups-devel-1:1.2.4-11.14.el5_1.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.14.el5_1.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "product": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "product_id": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.14.el5_1.6?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.2.4-11.14.el5_1.6.src" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.2.4-11.14.el5_1.6.src" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "regenrecht" ] } ], "cve": "CVE-2008-0047", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2008-02-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "436153" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: heap based buffer overflow in cgiCompileSearch()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0047" }, { "category": "external", "summary": "RHBZ#436153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0047", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0047" } ], "release_date": "2008-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-04-01T14:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0192" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cups: heap based buffer overflow in cgiCompileSearch()" }, { "cve": "CVE-2008-0053", "discovery_date": "2008-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "438117" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: buffer overflows in HP-GL/2 filter", "title": "Vulnerability summary" }, { "category": "other", "text": "NVD clarification:\n\nTo exploit this flaw an attacker needs to print a malicious file through the vulnerable filter (either themselves or by convincing a victim to do so), it should therefore be AC:M\n\nIn CUPS, print filters run as an unprivileged user no superuser (root), therefore this should be scored C:P, I:P, A:P", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0053" }, { "category": "external", "summary": "RHBZ#438117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0053", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0053" } ], "release_date": "2008-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-04-01T14:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0192" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cups: buffer overflows in HP-GL/2 filter" }, { "cve": "CVE-2008-1373", "discovery_date": "2008-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "438303" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: overflow in gif image filter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1373" }, { "category": "external", "summary": "RHBZ#438303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438303" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1373", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1373" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1373", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1373" } ], "release_date": "2008-04-01T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-04-01T14:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0192" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cups: overflow in gif image filter" } ] }
fkie_cve-2008-0053
Vulnerability from fkie_nvd
Published
2008-03-18 23:44
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://docs.info.apple.com/article.html?artnum=307562 | ||
cve@mitre.org | http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html | Patch | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00003.html | ||
cve@mitre.org | http://secunia.com/advisories/29420 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/29573 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/29603 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/29630 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/29634 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/29655 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/29659 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/29750 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/31324 | Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200804-01.xml | ||
cve@mitre.org | http://www.debian.org/security/2008/dsa-1625 | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2008:081 | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2008-0192.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2008-0206.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/28304 | ||
cve@mitre.org | http://www.securityfocus.com/bid/28334 | ||
cve@mitre.org | http://www.securitytracker.com/id?1019672 | ||
cve@mitre.org | http://www.ubuntu.com/usn/usn-598-1 | ||
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA08-079A.html | US Government Resource | |
cve@mitre.org | http://www.vupen.com/english/advisories/2008/0924/references | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/41272 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10356 | ||
cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://docs.info.apple.com/article.html?artnum=307562 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00003.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29420 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29573 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29603 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29630 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29634 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29655 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29659 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29750 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31324 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200804-01.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1625 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:081 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0192.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0206.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/28304 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/28334 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1019672 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-598-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA08-079A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/0924/references | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/41272 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10356 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apple | cups | * | |
apple | cups | 1.1 | |
apple | cups | 1.1.1 | |
apple | cups | 1.1.2 | |
apple | cups | 1.1.3 | |
apple | cups | 1.1.4 | |
apple | cups | 1.1.5 | |
apple | cups | 1.1.5-1 | |
apple | cups | 1.1.5-2 | |
apple | cups | 1.1.6 | |
apple | cups | 1.1.6-1 | |
apple | cups | 1.1.6-2 | |
apple | cups | 1.1.6-3 | |
apple | cups | 1.1.7 | |
apple | cups | 1.1.8 | |
apple | cups | 1.1.9 | |
apple | cups | 1.1.9-1 | |
apple | cups | 1.1.10 | |
apple | cups | 1.1.10-1 | |
apple | cups | 1.1.11 | |
apple | cups | 1.1.12 | |
apple | cups | 1.1.13 | |
apple | cups | 1.1.14 | |
apple | cups | 1.1.15 | |
apple | cups | 1.1.16 | |
apple | cups | 1.1.17 | |
apple | cups | 1.1.18 | |
apple | cups | 1.1.19 | |
apple | cups | 1.1.19 | |
apple | cups | 1.1.19 | |
apple | cups | 1.1.19 | |
apple | cups | 1.1.19 | |
apple | cups | 1.1.19 | |
apple | cups | 1.1.20 | |
apple | cups | 1.1.20 | |
apple | cups | 1.1.20 | |
apple | cups | 1.1.20 | |
apple | cups | 1.1.20 | |
apple | cups | 1.1.20 | |
apple | cups | 1.1.20 | |
apple | cups | 1.1.21 | |
apple | cups | 1.1.21 | |
apple | cups | 1.1.21 | |
apple | cups | 1.1.22 | |
apple | cups | 1.1.22 | |
apple | cups | 1.1.22 | |
apple | cups | 1.1.23 | |
apple | cups | 1.1.23 | |
apple | cups | 1.2 | |
apple | cups | 1.2 | |
apple | cups | 1.2 | |
apple | cups | 1.2 | |
apple | cups | 1.2 | |
apple | cups | 1.2.0 | |
apple | cups | 1.2.1 | |
apple | cups | 1.2.2 | |
apple | cups | 1.2.3 | |
apple | cups | 1.2.4 | |
apple | cups | 1.2.5 | |
apple | cups | 1.2.6 | |
apple | cups | 1.2.7 | |
apple | cups | 1.2.8 | |
apple | cups | 1.2.9 | |
apple | cups | 1.2.10 | |
apple | cups | 1.2.11 | |
apple | cups | 1.2.12 | |
apple | cups | 1.3 | |
apple | cups | 1.3 | |
apple | cups | 1.3 | |
apple | cups | 1.3.0 | |
apple | cups | 1.3.1 | |
apple | cups | 1.3.2 | |
apple | cups | 1.3.3 | |
apple | cups | 1.3.4 | |
apple | cups | 1.3.9 | |
apple | cups | 1.4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "matchCriteriaId": "604D0E97-6CCF-4793-9A13-647CA5FFB9E2", "versionEndIncluding": "1.3.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E4D89E03-94D0-4F7F-9A54-3021E3E5A321", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "298D6BE7-7683-4225-8DD6-4C0FC5EB48BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "230B77E7-B1AE-4470-859D-7B5F99749D74", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F8FECBBD-B1A2-4F42-8A68-32AB8331BDC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7B6070FC-4566-4314-940E-0AAE34B56E28", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "BC691F07-8B38-4867-AB18-51F380CAEA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*", "matchCriteriaId": "E943EFBF-39A7-408F-8AC5-677E83DFDBB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*", "matchCriteriaId": "5EA7725A-4398-4C76-BEBF-10E56C7F34F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "D7415295-0FBF-4946-8D99-8CB2EC391319", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*", "matchCriteriaId": "7C702EE3-4B7C-42EA-92AA-8717807CF67C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*", "matchCriteriaId": "73F74581-D71C-4FEC-BA8C-85EF4C1991BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*", "matchCriteriaId": "7ABCFB52-33D3-428C-B1D5-DCE504170A37", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "45F03F2B-6AC3-4872-9032-293C2E9B837C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7E02B6FB-C36D-45F3-95F3-566CA03B29A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "96093309-A87D-48D0-84DA-446255ABF231", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*", "matchCriteriaId": "CF67F149-614B-4507-A15F-E557A1B73423", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B4A14432-D8A1-4D19-9408-B9B4F2FC6B0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*", "matchCriteriaId": "49862F77-B8DE-4AA7-AE17-B348B05AC00E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "78D7719F-03E0-4E66-A50A-F8E857A9B6AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "F3139FDA-9476-4414-B349-7119E63FD268", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "523FE78C-441F-4ACD-B9F2-3E5293E277AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "F887B5B1-7528-4086-AE6C-134F54A93342", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "0D6D24ED-0D73-4CF2-B746-6EF29F2EF56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "E8C5C552-6276-4791-80CD-6B3EB425EF04", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "8335D4E3-563D-4288-B708-A9635BCA595F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5279D055-248A-4BD1-9FBB-0024BA16DF5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "BF791C1D-9AF8-4F0F-8F4B-844BC9A55DFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "16519855-FCB9-44A8-9C7E-116192327BAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "B1D9330B-C51A-4C7D-A322-85103C64D86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "2DA0C19F-95EB-429C-AF06-A2C1D5643662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*", "matchCriteriaId": "225CCE80-FF4B-4B39-B8BD-EB4710047524", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*", "matchCriteriaId": "07925DD8-50C0-4908-95D1-7342A4617BBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "48A519DB-6C6D-4094-814D-33BD5EF389BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "B6ED7566-5092-4B08-97A9-B2B53117A224", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "98DCAC0C-896F-4353-A665-5BCD0D8AEBA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*", "matchCriteriaId": "E72614CD-8F70-4E07-AD83-8FDE8026CEC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*", "matchCriteriaId": "48E62419-C165-4B42-8C23-E24821BD4BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*", "matchCriteriaId": "217D804B-CA56-49CE-B9EB-2A297EB1763C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*", "matchCriteriaId": "A41E8583-C837-4871-B4D2-FD41C78D538E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D480C37B-0DA8-4096-80B0-5198FE589A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*", "matchCriteriaId": "74F5A83B-3C1A-49F3-A9D6-F7B9B897E447", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*", "matchCriteriaId": "241D4183-879D-4974-BACB-A6987EDA2E7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "96592A93-4967-4B91-BCF7-558DC472E7BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*", "matchCriteriaId": "8758715D-B973-4960-8B7D-6F9A11E73288", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*", "matchCriteriaId": "0370E9EB-B830-4362-B83C-912579695691", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "DA3EC6EE-720D-4F27-A2E1-88AE53FC41A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*", "matchCriteriaId": "D644926A-C2A5-45FE-85A3-2782CE87ED86", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*", "matchCriteriaId": "AFB34629-DB13-4164-8A18-BD818E50528B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*", "matchCriteriaId": "2D432471-B5FD-4B1D-82DF-6F3152752071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "960DE41E-63DB-45EB-9B19-6349BDA05086", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*", "matchCriteriaId": "A57D2299-3409-4907-9FC0-5C3C715CDB37", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*", "matchCriteriaId": "C7EB92FA-3669-4530-BE69-84CF01D98FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0696E675-0A13-45FC-8917-845E6FF7A311", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "78BAC98C-1FE6-42A3-8B62-E3C321914F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "BCC3EF2F-0140-4185-9FB3-2B595B61CDC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7C36785A-F735-45C0-986B-9624AD65F0C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "3C1D3916-607F-44E8-9D47-93C6C0789083", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "174613C3-A04B-4701-849B-BAA598BF4F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "81C1137C-BE3D-45F9-83C9-D212107F0E14", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "3CBC1F81-E93A-42A7-8BC8-4B903688F2E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "1FA876FF-C58A-45CF-A8E8-E2068DF79421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "5FD78771-BD9A-4AC2-B664-B189DD288FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "50A16424-732F-4B76-A753-1642A97BC1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "E189C976-2DD2-485C-828E-7FC3DC6A8F32", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "A86CA90F-A944-4F3E-B75F-8147125335D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*", "matchCriteriaId": "690C4DEC-1467-4D7D-8E73-6EE1758439D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "FB5CA96B-411E-47BE-81A1-1C2E240A25F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "AA5A29C9-1913-4B8F-B162-66E71BEABD1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "9FAFABDC-E40F-4C53-AC66-94EFD077665D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "42A2F7B3-F4A7-416E-A07F-D4C5F0768B6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F96C1B80-9E20-4832-8308-BF7911569EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "3F2D7DB3-F467-4BC0-83BB-4706D067A2C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "ABD33C2C-7D39-4CCE-AC99-BC7B1B205A4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "7C671B95-8892-4D71-87FE-BABF5CBEC144", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DBD0B172-FB22-4270-B73D-4489EC2F4CE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en el filtro HP-GL/2-a-PostScript en CUPS versiones anteriores a 1.3.6, podr\u00edan permitir a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un archivo HP-GL/2 dise\u00f1ado." } ], "id": "CVE-2008-0053", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-03-18T23:44:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00003.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29420" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29573" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29603" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29630" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29634" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29655" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29659" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29750" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31324" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200804-01.xml" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1625" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0192.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0206.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/28304" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/28334" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019672" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-598-1" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41272" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10356" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29573" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29630" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29655" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29659" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29750" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200804-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0192.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0206.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019672" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-598-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10356" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "NVD clarification:\n\nTo exploit this flaw an attacker needs to print a malicious file through the vulnerable filter (either themselves or by convincing a victim to do so), it should therefore be AC:M\n\nIn CUPS, print filters run as an unprivileged user no superuser (root), therefore this should be scored C:P, I:P, A:P", "lastModified": "2008-05-15T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-gwr4-m5cm-8f54
Vulnerability from github
Published
2022-05-01 23:27
Modified
2022-05-01 23:27
VLAI Severity ?
Details
Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.
{ "affected": [], "aliases": [ "CVE-2008-0053" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-03-18T23:44:00Z", "severity": "HIGH" }, "details": "Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.", "id": "GHSA-gwr4-m5cm-8f54", "modified": "2022-05-01T23:27:24Z", "published": "2022-05-01T23:27:24Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0053" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41272" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10356" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html" }, { "type": "WEB", "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00003.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/29420" }, { "type": "WEB", "url": "http://secunia.com/advisories/29573" }, { "type": "WEB", "url": "http://secunia.com/advisories/29603" }, { "type": "WEB", "url": "http://secunia.com/advisories/29630" }, { "type": "WEB", "url": "http://secunia.com/advisories/29634" }, { "type": "WEB", "url": "http://secunia.com/advisories/29655" }, { "type": "WEB", "url": "http://secunia.com/advisories/29659" }, { "type": "WEB", "url": "http://secunia.com/advisories/29750" }, { "type": "WEB", "url": "http://secunia.com/advisories/31324" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200804-01.xml" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1625" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0192.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0206.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/28304" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/28334" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1019672" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-598-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/0924/references" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2008-0053
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2008-0053", "description": "Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.", "id": "GSD-2008-0053", "references": [ "https://www.suse.com/security/cve/CVE-2008-0053.html", "https://www.debian.org/security/2008/dsa-1625", "https://access.redhat.com/errata/RHSA-2008:0206", "https://access.redhat.com/errata/RHSA-2008:0192", "https://linux.oracle.com/cve/CVE-2008-0053.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2008-0053" ], "details": "Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.", "id": "GSD-2008-0053", "modified": "2023-12-13T01:22:58.323368Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2008:0206", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0206.html" }, { "name": "31324", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31324" }, { "name": "28304", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28304" }, { "name": "29659", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29659" }, { "name": "29573", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29573" }, { "name": "TA08-079A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html" }, { "name": "ADV-2008-0924", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "name": "USN-598-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-598-1" }, { "name": "SUSE-SA:2008:020", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00003.html" }, { "name": "MDVSA-2008:081", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081" }, { "name": "oval:org.mitre.oval:def:10356", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10356" }, { "name": "29420", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29420" }, { "name": "29630", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29630" }, { "name": "APPLE-SA-2008-03-18", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "name": "29750", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29750" }, { "name": "FEDORA-2008-2897", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html" }, { "name": "29634", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29634" }, { "name": "29655", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29655" }, { "name": "DSA-1625", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1625" }, { "name": "http://docs.info.apple.com/article.html?artnum=307562", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "name": "1019672", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019672" }, { "name": "28334", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28334" }, { "name": "macos-cups-inputvalidation-unspecified(41272)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41272" }, { "name": "RHSA-2008:0192", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0192.html" }, { "name": "GLSA-200804-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200804-01.xml" }, { "name": "29603", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29603" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.3.5", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0053" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2008-03-18", "refsource": "APPLE", "tags": [ "Patch" ], "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "name": "http://docs.info.apple.com/article.html?artnum=307562", "refsource": "CONFIRM", "tags": [], "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "name": "28334", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/28334" }, { "name": "1019672", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1019672" }, { "name": "TA08-079A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html" }, { "name": "28304", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/28304" }, { "name": "29420", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29420" }, { "name": "GLSA-200804-01", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200804-01.xml" }, { "name": "RHSA-2008:0192", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0192.html" }, { "name": "RHSA-2008:0206", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0206.html" }, { "name": "29634", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29634" }, { "name": "MDVSA-2008:081", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081" }, { "name": "USN-598-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-598-1" }, { "name": "29573", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29573" }, { "name": "29603", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29603" }, { "name": "29630", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29630" }, { "name": "29655", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29655" }, { "name": "FEDORA-2008-2897", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html" }, { "name": "29750", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29750" }, { "name": "SUSE-SA:2008:020", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00003.html" }, { "name": "29659", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29659" }, { "name": "31324", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31324" }, { "name": "DSA-1625", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2008/dsa-1625" }, { "name": "ADV-2008-0924", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "name": "macos-cups-inputvalidation-unspecified(41272)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41272" }, { "name": "oval:org.mitre.oval:def:10356", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10356" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": true, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2017-09-29T01:30Z", "publishedDate": "2008-03-18T23:44Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…