Bug 43591 - cups: Multiple issues (ES 3.3)
cups: Multiple issues (ES 3.3)
Status: CLOSED WONTFIX
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 3.3
Other Linux
: P5 normal (vote)
: ---
Assigned To: UCS maintainers
UCS maintainers
:
Depends on: 35402 39401
Blocks:
  Show dependency treegraph
 
Reported: 2017-02-20 20:49 CET by Arvid Requate
Modified: 2019-04-11 19:23 CEST (History)
1 user (show)

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional): Security
Max CVSS v3 score: 6.8 (CVSS:2.0/AV:A/AC:H/Au:N/C:C/I:C/A:C)


Attachments
cups-1.4.4-7+squeeze4-to-squeeze8.tar.bz2 (6.04 KB, application/x-bzip)
2017-02-20 20:52 CET, Arvid Requate
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Arvid Requate univentionstaff 2017-02-20 20:49:09 CET
Bug #39401 fixed the cups issues from 1.4.4-7+squeeze9 and +squeeze10, but apparently it didn't pick the patches from squeeze5 up to squeeze8:


Fixed in upstream Debian package version 1.4.4-7+squeeze5:

* Cross-site scripting in the web interface (CVE-2014-2856)

Fixed in upstream Debian package version 1.4.4-7+squeeze6:

* Cross-site scripting in the web interface (CVE-2014-5031, CVE-2014-5030, CVE-2014-5029)
* privilege escalation through the CUPS webinterface (CVE-2014-3537)

Fixed in upstream Debian package version 1.4.4-7+squeeze7:

* Buffer overflow in cupsRasterReadPixels (CVE-2014-2679)

Fixed in upstream Debian package version 1.4.4-7+squeeze8:

* Improper Update of Reference Count (CVE-2015-1158)
* Cross-Site Scripting (CVE-2015-1159)
Comment 1 Arvid Requate univentionstaff 2017-02-20 20:52:50 CET
Created attachment 8438 [details]
cups-1.4.4-7+squeeze4-to-squeeze8.tar.bz2

The extracted patches.
Comment 2 Stefan Gohmann univentionstaff 2019-01-03 07:11:26 CET
This issue has been filled against UCS 3.3. The maintenance with bug and security fixes for UCS 3.3 has ended on 31st of December 2016.

Customers still on UCS 3.3 are encouraged to update to UCS 4.3. Please contact
your partner or Univention for any questions.

If this issue still occurs in newer UCS versions, please use "Clone this bug" or simply reopen the issue. In this case please provide detailed information on how this issue is affecting you.