Cups SSL is vulnerable to POODLE
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
cups (Ubuntu) |
Fix Released
|
High
|
Unassigned | ||
Trusty |
Fix Released
|
High
|
Marc Deslauriers |
Bug Description
[Impact]
* Cups in Trusty is vulnerbable to the Poodle SSLv3. This disables it by default.
* Users who have clients that don't support TLS1.0 will not be able to connect, unless
they specify the additional options in cupsd.conf.
[Test Case]
* Install cupsd with /etc/cups/
* This should show up as having RC4 and SSLv3 disabled via a test like ssllabs.
* Same but specify SSLOptions to AllowSSL3 or AllowRC4.
[Regression Potential]
* One assumption was this should only affect WinXP and even then only IE6 winxp users. If incorrect more could be affected.
* The biggest issue could be that AllowSSL3 or AllowRC4 don't work in some unknown corner case. There's no evidence of this and other distros have deployed a very similar patch.
[Other Info]
* Only targetting 14.04 because of my assumption that if you're on 12.04 you are more likely to have older clients connecting to it.
Original description:
On 12.04 and 14.04 if you enable cups ssl you are vulnerable to poodle, and there does not appear to be any way to mitigate it in Cups config.
Ubuntu 14.04 - https:/
Ubuntu 12.04 - https:/
Fixed in wily - https:/
Upstream fix - https:/
Should we disable ssvl3 in the 12.04/14.04 cups by default and backport the option to turn it back on?
CVE References
information type: | Public → Public Security |
tags: | added: poodle |
tags: | added: precise trusty |
Changed in cups (Ubuntu): | |
importance: | Undecided → High |
description: | updated |
description: | updated |
Changed in cups (Ubuntu Trusty): | |
importance: | Undecided → High |
status: | New → Triaged |
summary: |
- Cups SSL is vulernable to POODLE + Cups SSL is vulnerable to POODLE |
What RH did: /rhn.redhat. com/errata/ RHBA-2015- 1346.html /bugzilla. redhat. com/show_ bug.cgi? id=1161171 /bugzilla. redhat. com/show_ bug.cgi? id=1161172
https:/
https:/
https:/
Upstream patch - http:// pastebin. ubuntu. com/12879503/