Whilst investigating a double-free issue in process_browse_data (Bug #433758) we discovered that older versions of CUPS as shipped with Enterprise Linux 3 and 4 did not free the mime type allocated when a remote resource timed out. A malicious user on the local subnet could send carefully crafted IPP packets to the udp port in such a way as to consume memory and lead to a CUPS crash.
Lifting embargo.
This issue was addressed in: Red Hat Enterprise Linux: http://rhn.redhat.com/errata/RHSA-2008-0153.html http://rhn.redhat.com/errata/RHSA-2008-0161.html
Created attachment 312752 [details] Patch as used in Red Hat Enterprise Linux 4 CUPS packages based on upstream 1.1.22rc1