Security update for cups
Announcement ID: | SUSE-SU-2018:2162-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves five vulnerabilities and has two security fixes can now be installed.
Description:
This update for cups fixes the following issues:
The following security vulnerabilities were fixed:
- CVE-2017-18248: Handle invalid characters properly in printing jobs. This fixes a problem that was causing the DBUS library to abort the calling process. (bsc#1061066 bsc#1087018)
- Fixed a local privilege escalation to root and sandbox bypasses in the scheduler
- CVE-2018-4180: Fixed a local privilege escalation to root in dnssd backend (bsc#1096405)
- CVE-2018-4181: Limited local file reads as root via cupsd.conf include directive (bsc#1096406)
- CVE-2018-4182: Fixed a sandbox bypass due to insecure error handling (bsc#1096407)
- CVE-2018-4183: Fixed a sandbox bypass due to profile misconfiguration (bsc#1096408)
The following other issue was fixed:
- Fixed authorization check for clients (like samba) connected through the local socket when Kerberos authentication is enabled (bsc#1050082)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Software Bootstrap Kit 12 12-SP3
zypper in -t patch SUSE-SLE-BSK-12-SP3-2018-1471=1
-
SUSE Linux Enterprise Desktop 12 SP3
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-1471=1
-
SUSE Linux Enterprise Software Development Kit 12 SP3
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-1471=1
-
SUSE Linux Enterprise Server 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1471=1
-
SUSE Linux Enterprise High Performance Computing 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1471=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1471=1
Package List:
-
SUSE Linux Enterprise Software Bootstrap Kit 12 12-SP3 (ppc64le s390x x86_64)
- cups-ddk-1.7.5-20.14.1
- cups-ddk-debuginfo-1.7.5-20.14.1
- cups-debugsource-1.7.5-20.14.1
- cups-debuginfo-1.7.5-20.14.1
-
SUSE Linux Enterprise Desktop 12 SP3 (x86_64)
- cups-libs-32bit-1.7.5-20.14.1
- cups-debugsource-1.7.5-20.14.1
- cups-libs-debuginfo-1.7.5-20.14.1
- cups-client-1.7.5-20.14.1
- cups-libs-1.7.5-20.14.1
- cups-libs-debuginfo-32bit-1.7.5-20.14.1
- cups-1.7.5-20.14.1
- cups-debuginfo-1.7.5-20.14.1
- cups-client-debuginfo-1.7.5-20.14.1
-
SUSE Linux Enterprise Software Development Kit 12 SP3 (aarch64 ppc64le s390x x86_64)
- cups-debugsource-1.7.5-20.14.1
- cups-ddk-1.7.5-20.14.1
- cups-devel-1.7.5-20.14.1
- cups-ddk-debuginfo-1.7.5-20.14.1
- cups-debuginfo-1.7.5-20.14.1
-
SUSE Linux Enterprise Server 12 SP3 (aarch64 ppc64le s390x x86_64)
- cups-debugsource-1.7.5-20.14.1
- cups-libs-debuginfo-1.7.5-20.14.1
- cups-client-1.7.5-20.14.1
- cups-libs-1.7.5-20.14.1
- cups-1.7.5-20.14.1
- cups-debuginfo-1.7.5-20.14.1
- cups-client-debuginfo-1.7.5-20.14.1
-
SUSE Linux Enterprise Server 12 SP3 (s390x x86_64)
- cups-libs-32bit-1.7.5-20.14.1
- cups-libs-debuginfo-32bit-1.7.5-20.14.1
-
SUSE Linux Enterprise High Performance Computing 12 SP3 (aarch64 x86_64)
- cups-debugsource-1.7.5-20.14.1
- cups-libs-debuginfo-1.7.5-20.14.1
- cups-client-1.7.5-20.14.1
- cups-libs-1.7.5-20.14.1
- cups-1.7.5-20.14.1
- cups-debuginfo-1.7.5-20.14.1
- cups-client-debuginfo-1.7.5-20.14.1
-
SUSE Linux Enterprise High Performance Computing 12 SP3 (x86_64)
- cups-libs-32bit-1.7.5-20.14.1
- cups-libs-debuginfo-32bit-1.7.5-20.14.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP3 (ppc64le x86_64)
- cups-debugsource-1.7.5-20.14.1
- cups-libs-debuginfo-1.7.5-20.14.1
- cups-client-1.7.5-20.14.1
- cups-libs-1.7.5-20.14.1
- cups-1.7.5-20.14.1
- cups-debuginfo-1.7.5-20.14.1
- cups-client-debuginfo-1.7.5-20.14.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP3 (x86_64)
- cups-libs-32bit-1.7.5-20.14.1
- cups-libs-debuginfo-32bit-1.7.5-20.14.1
References:
- https://www.suse.com/security/cve/CVE-2017-18248.html
- https://www.suse.com/security/cve/CVE-2018-4180.html
- https://www.suse.com/security/cve/CVE-2018-4181.html
- https://www.suse.com/security/cve/CVE-2018-4182.html
- https://www.suse.com/security/cve/CVE-2018-4183.html
- https://bugzilla.suse.com/show_bug.cgi?id=1050082
- https://bugzilla.suse.com/show_bug.cgi?id=1061066
- https://bugzilla.suse.com/show_bug.cgi?id=1087018
- https://bugzilla.suse.com/show_bug.cgi?id=1096405
- https://bugzilla.suse.com/show_bug.cgi?id=1096406
- https://bugzilla.suse.com/show_bug.cgi?id=1096407
- https://bugzilla.suse.com/show_bug.cgi?id=1096408