Jann Horn discovered that CUPS incorrectly handled session cookie
randomness. A remote attacker could possibly use this issue to perform
cross-site request forgery (CSRF) attacks.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 18.10 | noarch | cups | < 2.2.8-5ubuntu1.1 | UNKNOWN |
Ubuntu | 18.10 | noarch | cups-bsd | < 2.2.8-5ubuntu1.1 | UNKNOWN |
Ubuntu | 18.10 | noarch | cups-bsd-dbgsym | < 2.2.8-5ubuntu1.1 | UNKNOWN |
Ubuntu | 18.10 | noarch | cups-client | < 2.2.8-5ubuntu1.1 | UNKNOWN |
Ubuntu | 18.10 | noarch | cups-client-dbgsym | < 2.2.8-5ubuntu1.1 | UNKNOWN |
Ubuntu | 18.10 | noarch | cups-common | < 2.2.8-5ubuntu1.1 | UNKNOWN |
Ubuntu | 18.10 | noarch | cups-core-drivers | < 2.2.8-5ubuntu1.1 | UNKNOWN |
Ubuntu | 18.10 | noarch | cups-core-drivers-dbgsym | < 2.2.8-5ubuntu1.1 | UNKNOWN |
Ubuntu | 18.10 | noarch | cups-daemon | < 2.2.8-5ubuntu1.1 | UNKNOWN |
Ubuntu | 18.10 | noarch | cups-daemon-dbgsym | < 2.2.8-5ubuntu1.1 | UNKNOWN |