Debian: DSA-4243-1: cups security update

    Date11 Jul 2018
    CategoryDebian
    2873
    Posted ByAnthony Pell
    Several vulnerabilities were discovered in CUPS, the Common UNIX Printing System. These issues have been identified with the following CVE ids: CVE-2017-15400
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-4243-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                            Luciano Bello
    July 11, 2018                         https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : cups
    CVE ID         : CVE-2017-15400 CVE-2018-4180 CVE-2018-4181 CVE-2018-4182 
                     CVE-2018-4183 CVE-2018-6553
    
    Several vulnerabilities were discovered in CUPS, the Common UNIX Printing
    System. These issues have been identified with the following CVE ids:
    
    CVE-2017-15400
    
        Rory McNamara discovered that an attacker is able to execute arbitrary
        commands (with the privilege of the CUPS daemon) by setting a
        malicious IPP server with a crafted PPD file.
    
    CVE-2018-4180
    
         Dan Bastone of Gotham Digital Science discovered that a local
         attacker with access to cupsctl could escalate privileges by setting
         an environment variable. 
    
    CVE-2018-4181
    
         Eric Rafaloff and John Dunlap of Gotham Digital Science discovered
         that a local attacker can perform limited reads of arbitrary files
         as root by manipulating cupsd.conf.
    
    CVE-2018-4182
    
        Dan Bastone of Gotham Digital Science discovered that an attacker
        with sandboxed root access can execute backends without a sandbox
        profile by provoking an error in CUPS' profile creation.
    
    CVE-2018-4183
    
         Dan Bastone and Eric Rafaloff of Gotham Digital Science discovered
         that an attacker with sandboxed root access can execute arbitrary
         commands as unsandboxed root by modifying /etc/cups/cups-files.conf
    
    CVE-2018-6553
    
        Dan Bastone of Gotham Digital Science discovered that an attacker
        can bypass the AppArmor cupsd sandbox by invoking the dnssd backend
        using an alternate name that has been hard linked to dnssd.
    
    
    For the stable distribution (stretch), these problems have been fixed in
    version 2.2.1-8+deb9u2.
    
    We recommend that you upgrade your cups packages.
    
    For the detailed security status of cups please refer to
    its security tracker page at:
    https://security-tracker.debian.org/tracker/cups
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.