Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1607291 - (CVE-2018-4181) CVE-2018-4181 cups: Manipulation of cupsd.conf by a local attacker resulting in limited reads of arbitrary files as root
CVE-2018-4181 cups: Manipulation of cupsd.conf by a local attacker resulting ...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20180509,repor...
: Security
Depends On: 1607295 1619490 1607293
Blocks: 1607292
  Show dependency treegraph
 
Reported: 2018-07-23 04:24 EDT by Andrej Nemec
Modified: 2018-08-20 23:33 EDT (History)
12 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Andrej Nemec 2018-07-23 04:24:50 EDT
It was found that a local attacker can perform limited reads of arbitrary files as root by manipulating cupsd.conf.

Upstream patch:

https://github.com/apple/cups/commit/d47f6aec436e0e9df6554436e391471097686ecc
Comment 1 Andrej Nemec 2018-07-23 04:31:00 EDT
Created cups tracking bugs for this issue:

Affects: fedora-all [bug 1607293]
Comment 3 Doran Moppert 2018-08-20 23:32:35 EDT
Similar to CVE-2018-4180, this attack vector is only available to users in the cups SystemGroup groups, who can manipulate cupsd.conf using cupsctl.  Impact is further limited when SELinux is enforcing as cupsd operates under a restricted context cupsd_t.

Note You need to log in before you can comment on or make changes to this bug.