it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5149-1] cups security update
- Date: Thu, 26 May 2022 19:14:43 +0000
- List-archive: https://lists.debian.org/msgid-search/20220526191443.GA6114 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From: Date:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=KEVTpowMwWATiSVN9pDnf5XxV8yEbhynEuBlgakrkJY=; b=DT vng7FaELyO2csyCjeCu0NkPIrkbVOvpSDC58lsJI0jNNbP8DYnwtt6uazKpKZFOULbjLv3+l3awfe L8Znq1XE0WEXygpUUUEkvR94IZLiVhOJ5MTsGhYqsQXU1CJJWzBCMjGT5jhsUDBwsaFf3kai7i4uZ 9bhYJpVCZfj0MndNLM3H52XTWS+7myZqwopjplzwkJv2aEH1NfZfXy8RK64Sgwz5wQIUTGnXCjLJE zV8btw6MsO+96dy4vgX6VkztCfpQ14Y+3nhwpkYrtMKG+SIGFzEekc0GOLSQJE9DphusVM+Igv+Cb 7WemFh0XkuVy9NjsX8TY9JQKgZop0HLw==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Thu, 26 May 2022 19:15:04 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <twReP2j_bfP.A.LOB.4G9jiB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5149-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
May 26, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : cups
CVE ID : CVE-2022-26691
Joshua Mason discovered that a logic error in the validation of the
secret key used in the "local" authorisation mode of the CUPS printing
system may result in privilege escalation.
For the oldstable distribution (buster), this problem has been fixed
in version 2.2.10-6+deb10u6.
For the stable distribution (bullseye), this problem has been fixed in
version 2.3.3op2-3+deb11u2.
We recommend that you upgrade your cups packages.
For the detailed security status of cups please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/cups
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmKP0LQACgkQEMKTtsN8
TjazShAAuLbe1vQOBAX5nUuVTW4fk96gzx899Aep8Wl4AWFmLRSWzdpPVeIEuWei
wgQycz4YFzKNr+FeCBIx5ZwnmddPd30RYFQjgkUg/UbFD2z3yifT5M3OQRpgsE4+
EWGPR8V2vZEw+20H22ZhtXGzPiwM+czt120v2mBX2Zf2xOtPLAFtVcLJN5PJsgfO
hEgHn5zUwumqYEzD7kZNgT98eHtrUvwO3nCveOXWzR4dMD/KgMmCGQIQi+dawEef
JJNRgvqIgb2sqxxYPHlq/IHQ5H7/NeYfqsHZxf2sRcRRu3XVYql4wMOiegZRk3xz
+inf0V4GbVBiMfjDJYv3WnsGzm7W4I6rMTfhSq783yXSh6AUt2l/u6xoc7ca6vvd
lTk5l/9ZhsFxzWdAgUA7ceqmciXCE+yTGaRDw4yP05Vp4cTBKggOz7dws5t75ixH
/JHwyVQ72AtFiMkMgRjKv8+zP0FbWiOrS3EDyvCjP3vx69dXie2Z1/HvGtoaFY4f
HgjAbq2i+f8umwYvcf8cdErjRz9CIX09+TuX/J/M1D8X5TNw4KRx3DChca+o94+Q
ZNznkpoCnMVfmUe83P8PgcGLMD0hGai5AnjlroDJyvZn3aD84PVLdDY35wnR/6eq
DyB81widY5C9SURR/CUWXx2F1NaWLmAsQbLttlFLwzVqUTf76j8=
=jd0o
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5149-1] cups security update, Moritz Muehlenhoff, 26.05.2022
Archiv bereitgestellt durch MHonArc 2.6.24.