Debian LTS: DLA-1412-1: cups security update
Summary
A localhost.localdomain whitelist entry in valid_host() in
scheduler/client.c in CUPS before 2.2.2 allows remote attackers to
execute arbitrary IPP commands by sending POST requests to the
CUPS daemon in conjunction with DNS rebinding. The
localhost.localdomain name is often resolved via a DNS server
(neither the OS nor the web browser is responsible for ensuring
that localhost.localdomain is 127.0.0.1).
CVE-2017-18248
The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when
D-Bus support is enabled, can be crashed by remote attackers by
sending print jobs with an invalid username, related to a D-Bus
notification.
For Debian 8 "Jessie", these problems have been fixed in version
1.7.5-11+deb8u3.
We recommend that you upgrade your cups packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Package :cups