The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX(R) operating systems.
A bug was found in the way CUPS processes malformed HTTP requests. It is possible for a remote user capable of connecting to the CUPS daemon to issue a malformed HTTP GET request that causes CUPS to enter an infinite loop. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-2874 to this issue.
Two small bugs have also been fixed in this update. A signal handling problem has been fixed that could occasionally cause the scheduler to stop when told to reload. A problem with tracking open file descriptors under certain specific circumstances has also been fixed.
All users of CUPS should upgrade to these erratum packages, which contain a patch to correct this issue.