[USN-3713-1] CUPS vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============4598351840193348387==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”g4t8xAbKSqe4YkbkGfSioecx5dCcYaxVY”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–g4t8xAbKSqe4YkbkGfSioecx5dCcYaxVY
Content-Type: multipart/mixed; boundary=”JnkOBRdVwrdonqkYRUbqYnImDwI4jNZTO”;
protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3713-1] CUPS vulnerabilities

–JnkOBRdVwrdonqkYRUbqYnImDwI4jNZTO
Content-Type: text/plain; charset=utf-8
Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3713-1
July 11, 2018

cups vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in CUPS.

Software Description:
– cups: Common UNIX Printing System(tm)

Details:

It was discovered that CUPS incorrectly handled certain print jobs with
invalid usernames. A remote attacker could possibly use this issue to cau=
se
CUPS to crash, resulting in a denial of service. This issue only affected=

Ubuntu 14.04 LTS, Ubuntu 17.10 and Ubuntu 18.04 LTS. (CVE-2017-18248)

Dan Bastone discovered that the CUPS dnssd backend incorrectly handled
certain environment variables. A local attacker could possibly use this
issue to escalate privileges. (CVE-2018-4180)

Eric Rafaloff and John Dunlap discovered that CUPS incorrectly handled
certain include directives. A local attacker could possibly use this issu=
e
to read arbitrary files. (CVE-2018-4181)

Dan Bastone discovered that the CUPS AppArmor profile incorrectly confine=
d
the dnssd backend. A local attacker could possibly use this issue to esca=
pe
confinement. (CVE-2018-6553)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
cups 2.2.7-1ubuntu2.1

Ubuntu 17.10:
cups 2.2.4-7ubuntu3.1

Ubuntu 16.04 LTS:
cups 2.1.3-4ubuntu0.5

Ubuntu 14.04 LTS:
cups 1.7.2-0ubuntu1.10

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3713-1
CVE-2017-18248, CVE-2018-4180, CVE-2018-4181, CVE-2018-6553

Package Information:
https://launchpad.net/ubuntu/+source/cups/2.2.7-1ubuntu2.1
https://launchpad.net/ubuntu/+source/cups/2.2.4-7ubuntu3.1
https://launchpad.net/ubuntu/+source/cups/2.1.3-4ubuntu0.5
https://launchpad.net/ubuntu/+source/cups/1.7.2-0ubuntu1.10

–JnkOBRdVwrdonqkYRUbqYnImDwI4jNZTO–

–g4t8xAbKSqe4YkbkGfSioecx5dCcYaxVY
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=APSN
—–END PGP SIGNATURE—–

–g4t8xAbKSqe4YkbkGfSioecx5dCcYaxVY–

–===============4598351840193348387==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============4598351840193348387==–