==========================================================================
Ubuntu Security Notice USN-3713-1
July 11, 2018
cups vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 18.04 LTS
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in CUPS.
Software Description:
– cups: Common UNIX Printing System(tm)
Details:
It was discovered that CUPS incorrectly handled certain print jobs with
invalid usernames. A remote attacker could possibly use this issue to cause
CUPS to crash, resulting in a denial of service. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 17.10 and Ubuntu 18.04 LTS. (CVE-2017-18248)
Dan Bastone discovered that the CUPS dnssd backend incorrectly handled
certain environment variables. A local attacker could possibly use this
issue to escalate privileges. (CVE-2018-4180)
Eric Rafaloff and John Dunlap discovered that CUPS incorrectly handled
certain include directives. A local attacker could possibly use this issue
to read arbitrary files. (CVE-2018-4181)
Dan Bastone discovered that the CUPS AppArmor profile incorrectly confined
the dnssd backend. A local attacker could possibly use this issue to escape
confinement. (CVE-2018-6553)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
cups 2.2.7-1ubuntu2.1
Ubuntu 17.10:
cups 2.2.4-7ubuntu3.1
Ubuntu 16.04 LTS:
cups 2.1.3-4ubuntu0.5
Ubuntu 14.04 LTS:
cups 1.7.2-0ubuntu1.10
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3713-1
CVE-2017-18248, CVE-2018-4180, CVE-2018-4181, CVE-2018-6553
Package Information:
https://launchpad.net/ubuntu/+source/cups/2.2.7-1ubuntu2.1
https://launchpad.net/ubuntu/+source/cups/2.2.4-7ubuntu3.1
https://launchpad.net/ubuntu/+source/cups/2.1.3-4ubuntu0.5
https://launchpad.net/ubuntu/+source/cups/1.7.2-0ubuntu1.10
—–BEGIN PGP SIGNATURE—–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=APSN
—–END PGP SIGNATURE—–
—