This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============4598351840193348387==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”g4t8xAbKSqe4YkbkGfSioecx5dCcYaxVY”
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–g4t8xAbKSqe4YkbkGfSioecx5dCcYaxVY
Content-Type: multipart/mixed; boundary=”JnkOBRdVwrdonqkYRUbqYnImDwI4jNZTO”;
protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3713-1] CUPS vulnerabilities
–JnkOBRdVwrdonqkYRUbqYnImDwI4jNZTO
Content-Type: text/plain; charset=utf-8
Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3713-1
July 11, 2018
cups vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 18.04 LTS
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in CUPS.
Software Description:
– cups: Common UNIX Printing System(tm)
Details:
It was discovered that CUPS incorrectly handled certain print jobs with
invalid usernames. A remote attacker could possibly use this issue to cau=
se
CUPS to crash, resulting in a denial of service. This issue only affected=
Ubuntu 14.04 LTS, Ubuntu 17.10 and Ubuntu 18.04 LTS. (CVE-2017-18248)
Dan Bastone discovered that the CUPS dnssd backend incorrectly handled
certain environment variables. A local attacker could possibly use this
issue to escalate privileges. (CVE-2018-4180)
Eric Rafaloff and John Dunlap discovered that CUPS incorrectly handled
certain include directives. A local attacker could possibly use this issu=
e
to read arbitrary files. (CVE-2018-4181)
Dan Bastone discovered that the CUPS AppArmor profile incorrectly confine=
d
the dnssd backend. A local attacker could possibly use this issue to esca=
pe
confinement. (CVE-2018-6553)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
cups 2.2.7-1ubuntu2.1
Ubuntu 17.10:
cups 2.2.4-7ubuntu3.1
Ubuntu 16.04 LTS:
cups 2.1.3-4ubuntu0.5
Ubuntu 14.04 LTS:
cups 1.7.2-0ubuntu1.10
In general, a standard system update will make all the necessary changes.=
References:
https://usn.ubuntu.com/usn/usn-3713-1
CVE-2017-18248, CVE-2018-4180, CVE-2018-4181, CVE-2018-6553
Package Information:
https://launchpad.net/ubuntu/+source/cups/2.2.7-1ubuntu2.1
https://launchpad.net/ubuntu/+source/cups/2.2.4-7ubuntu3.1
https://launchpad.net/ubuntu/+source/cups/2.1.3-4ubuntu0.5
https://launchpad.net/ubuntu/+source/cups/1.7.2-0ubuntu1.10
–JnkOBRdVwrdonqkYRUbqYnImDwI4jNZTO–
–g4t8xAbKSqe4YkbkGfSioecx5dCcYaxVY
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”
—–BEGIN PGP SIGNATURE—–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=APSN
—–END PGP SIGNATURE—–
–g4t8xAbKSqe4YkbkGfSioecx5dCcYaxVY–
–===============4598351840193348387==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK
–===============4598351840193348387==–