Cross-Site Request Forgery in cups
ID: | openSUSE-SU-2018:4141-1 |
Distribution: | SUSE |
Plattformen: | openSUSE Leap 42.3 |
Datum: | Sa, 15. Dezember 2018, 13:15 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4700 |
Applikationen: | Common UNIX Printing System |
Originalnachricht |
|
openSUSE Security Update: Security update for cups ______________________________________________________________________________ Announcement ID: openSUSE-SU-2018:4141-1 Rating: important References: #1115750 Cross-References: CVE-2018-4700 Affected Products: openSUSE Leap 42.3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for cups fixes the following security issue: - CVE-2018-4700: Fixed extremely predictable cookie generation that is effectively breaking the CSRF protection of the CUPS web interface (bsc#1115750). This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-1555=1 Package List: - openSUSE Leap 42.3 (i586 x86_64): cups-1.7.5-12.9.1 cups-client-1.7.5-12.9.1 cups-client-debuginfo-1.7.5-12.9.1 cups-ddk-1.7.5-12.9.1 cups-ddk-debuginfo-1.7.5-12.9.1 cups-debuginfo-1.7.5-12.9.1 cups-debugsource-1.7.5-12.9.1 cups-devel-1.7.5-12.9.1 cups-libs-1.7.5-12.9.1 cups-libs-debuginfo-1.7.5-12.9.1 - openSUSE Leap 42.3 (x86_64): cups-libs-32bit-1.7.5-12.9.1 cups-libs-debuginfo-32bit-1.7.5-12.9.1 References: https://www.suse.com/security/cve/CVE-2018-4700.html https://bugzilla.suse.com/1115750 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org |