[cups-devel] [HIGH] STR #4476: CUPS needs a way to control the use of cipher suites and protocol versions

Panchami Sanjeev noreply at cups.org
Wed Apr 15 22:41:28 PDT 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

DO NOT REPLY TO THIS MESSAGE.  INSTEAD, POST ANY RESPONSES TO THE LINK BELOW.

[STR Resolved]

This patch solves POODLE Vulnerability by disabling SSLv3 in CUPS. This fix
is specific to solaris , which is using cups 1.4.5
The fix addresses the issue by disabling SSLv3 
(i). In HTTP routines where we set up SSL/TLS support on a connection
(ii). In Client routines for the CUPS Scheduler where we create the SSL
context and accept the connection when enabling encryption for the client.

Patch file is attached.

Link: https://www.cups.org/str.php?L4476
Version: 1.4.2
Fix Version: 2.1-current (r12215)
Attachment: https://www.cups.org/strfiles.php/3489/23-20231096.patch
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.14 (GNU/Linux)
Comment: GPGTools - https://gpgtools.org
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=h1MQ
-----END PGP SIGNATURE-----




More information about the cups-devel mailing list