Francisco Alonso discovered that the CUPS web interface incorrectly validated permissions on rss files. A local attacker could possibly use this issue to bypass file permissions and read arbitrary files, possibly leading to a privilege escalation.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "cups" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "cups-bsd" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "cups-client" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "cups-common" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "cups-core-drivers" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "cups-daemon" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "cups-dbg" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "cups-ppdc" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "cups-server-common" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "libcups2" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "libcups2-dev" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "libcupscgi1" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "libcupscgi1-dev" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "libcupsimage2" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "libcupsimage2-dev" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "libcupsmime1" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "libcupsmime1-dev" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "libcupsppdc1" }, { "binary_version": "1.7.2-0ubuntu1.1", "binary_name": "libcupsppdc1-dev" } ] }