Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-47176
Vulnerability from cvelistv5
Published
2024-09-26 21:13
Modified
2024-10-02 19:16
Severity ?
EPSS score ?
Summary
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | OpenPrinting | cups-browsed |
Version: <= 2.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-09-27T19:39:10.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/09/27/6" }, { "url": "https://github.com/OpenPrinting/cups-browsed/commit/1debe6b140c37e0aa928559add4abcc95ce54aa2" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } }, { "affected": [ { "cpes": [ "cpe:2.3:a:openprinting:cups:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cups", "vendor": "openprinting", "versions": [ { "status": "affected", "version": "2.0.1" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-47176", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T18:10:15.456578Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T18:13:04.491Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "cups-browsed", "vendor": "OpenPrinting", "versions": [ { "status": "affected", "version": "\u003c= 2.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1327", "description": "CWE-1327: Binding to an Unrestricted IP Address", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T19:16:51.368Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "name": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47" }, { "name": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5" }, { "name": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "name": "https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992" }, { "name": "https://www.cups.org", "tags": [ "x_refsource_MISC" ], "url": "https://www.cups.org" }, { "name": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I", "tags": [ "x_refsource_MISC" ], "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I" } ], "source": { "advisory": "GHSA-rj88-6mr5-rcw8", "discovery": "UNKNOWN" }, "title": "cups-browsed binds to `INADDR_ANY:631`, trusting any packet from any source" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-47176", "datePublished": "2024-09-26T21:13:05.913Z", "dateReserved": "2024-09-19T22:32:11.962Z", "dateUpdated": "2024-10-02T19:16:51.368Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-47176\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-09-26T22:15:04.497\",\"lastModified\":\"2024-11-21T09:39:28.853\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.\"},{\"lang\":\"es\",\"value\":\"CUPS es un sistema de impresi\u00f3n de c\u00f3digo abierto basado en est\u00e1ndares, y `cups-browsed` contiene funcionalidades de impresi\u00f3n en red que incluyen, entre otras, servicios de impresi\u00f3n de detecci\u00f3n autom\u00e1tica e impresoras compartidas. `cups-browsed` se vincula a `INADDR_ANY:631`, lo que hace que conf\u00ede en cualquier paquete de cualquier origen, y puede provocar la solicitud IPP `Get-Printer-Attributes` a una URL controlada por el atacante. Debido a la vinculaci\u00f3n del servicio a `*:631 ( INADDR_ANY )`, se pueden explotar varios errores en `cups-browsed` en secuencia para introducir una impresora maliciosa en el sistema. Esta cadena de exploits finalmente permite a un atacante ejecutar comandos arbitrarios de forma remota en la m\u00e1quina de destino sin autenticaci\u00f3n cuando se inicia un trabajo de impresi\u00f3n. Esto plantea un riesgo de seguridad significativo en la red. Cabe destacar que esta vulnerabilidad es particularmente preocupante ya que se puede explotar desde Internet p\u00fablico, lo que potencialmente expone una gran cantidad de sistemas a ataques remotos si sus servicios CUPS est\u00e1n habilitados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1327\"}]}],\"references\":[{\"url\":\"https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://www.cups.org\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I\",\"source\":\"security-advisories@github.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/09/27/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/OpenPrinting/cups-browsed/commit/1debe6b140c37e0aa928559add4abcc95ce54aa2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2024_7346
Vulnerability from csaf_redhat
Published
2024-09-27 20:20
Modified
2024-11-24 19:40
Summary
Red Hat Security Advisory: cups-filters security update
Notes
Topic
An update for cups-filters is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently.
Security Fix(es):
* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()
* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)
* cups: libppd: remote command injection via attacker controlled data in PPD file ()
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cups-filters is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. \n\nSecurity Fix(es):\n\n* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()\n\n* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)\n\n* cups: libppd: remote command injection via attacker controlled data in PPD file ()\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:7346", "url": "https://access.redhat.com/errata/RHSA-2024:7346" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7346.json" } ], "title": "Red Hat Security Advisory: cups-filters security update", "tracking": { "current_release_date": "2024-11-24T19:40:26+00:00", "generator": { "date": "2024-11-24T19:40:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:7346", "initial_release_date": "2024-09-27T20:20:45+00:00", "revision_history": [ { "date": "2024-09-27T20:20:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-09-27T20:20:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T19:40:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 9)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.28.7-17.el9_4.src", "product": { "name": "cups-filters-0:1.28.7-17.el9_4.src", "product_id": "cups-filters-0:1.28.7-17.el9_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.28.7-17.el9_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.28.7-17.el9_4.aarch64", "product": { "name": "cups-filters-0:1.28.7-17.el9_4.aarch64", "product_id": "cups-filters-0:1.28.7-17.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.28.7-17.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "product": { "name": "cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "product_id": "cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.28.7-17.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "product": { "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "product_id": "cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.28.7-17.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "product": { "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "product_id": "cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.28.7-17.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "product": { "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "product_id": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.28.7-17.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "product": { "name": "cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "product_id": "cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.28.7-17.el9_4?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.28.7-17.el9_4.ppc64le", "product": { "name": "cups-filters-0:1.28.7-17.el9_4.ppc64le", "product_id": "cups-filters-0:1.28.7-17.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.28.7-17.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "product": { "name": "cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "product_id": "cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.28.7-17.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "product": { "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "product_id": "cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.28.7-17.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "product": { "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "product_id": "cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.28.7-17.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "product": { "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "product_id": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.28.7-17.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "product": { "name": "cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "product_id": "cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.28.7-17.el9_4?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.28.7-17.el9_4.x86_64", "product": { "name": "cups-filters-0:1.28.7-17.el9_4.x86_64", "product_id": "cups-filters-0:1.28.7-17.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.28.7-17.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "product": { "name": "cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "product_id": "cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.28.7-17.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "product": { "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "product_id": "cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.28.7-17.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "product": { "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "product_id": "cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.28.7-17.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "product": { "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "product_id": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.28.7-17.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "product": { "name": "cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "product_id": "cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.28.7-17.el9_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-libs-0:1.28.7-17.el9_4.i686", "product": { "name": "cups-filters-libs-0:1.28.7-17.el9_4.i686", "product_id": "cups-filters-libs-0:1.28.7-17.el9_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.28.7-17.el9_4?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "product": { "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "product_id": "cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.28.7-17.el9_4?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "product": { "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "product_id": "cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.28.7-17.el9_4?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "product": { "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "product_id": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.28.7-17.el9_4?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.28.7-17.el9_4.i686", "product": { "name": "cups-filters-devel-0:1.28.7-17.el9_4.i686", "product_id": "cups-filters-devel-0:1.28.7-17.el9_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.28.7-17.el9_4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.28.7-17.el9_4.s390x", "product": { "name": "cups-filters-0:1.28.7-17.el9_4.s390x", "product_id": "cups-filters-0:1.28.7-17.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.28.7-17.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.28.7-17.el9_4.s390x", "product": { "name": "cups-filters-libs-0:1.28.7-17.el9_4.s390x", "product_id": "cups-filters-libs-0:1.28.7-17.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.28.7-17.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "product": { "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "product_id": "cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.28.7-17.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "product": { "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "product_id": "cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.28.7-17.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "product": { "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "product_id": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.28.7-17.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.28.7-17.el9_4.s390x", "product": { "name": "cups-filters-devel-0:1.28.7-17.el9_4.s390x", "product_id": "cups-filters-devel-0:1.28.7-17.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.28.7-17.el9_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-17.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64" }, "product_reference": "cups-filters-0:1.28.7-17.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-17.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le" }, "product_reference": "cups-filters-0:1.28.7-17.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-17.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x" }, "product_reference": "cups-filters-0:1.28.7-17.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-17.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src" }, "product_reference": "cups-filters-0:1.28.7-17.el9_4.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-17.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64" }, "product_reference": "cups-filters-0:1.28.7-17.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64" }, "product_reference": "cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686" }, "product_reference": "cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le" }, "product_reference": "cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x" }, "product_reference": "cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-17.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64" }, "product_reference": "cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-17.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686" }, "product_reference": "cups-filters-devel-0:1.28.7-17.el9_4.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-17.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le" }, "product_reference": "cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-17.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x" }, "product_reference": "cups-filters-devel-0:1.28.7-17.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-17.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64" }, "product_reference": "cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-17.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64" }, "product_reference": "cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-17.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686" }, "product_reference": "cups-filters-libs-0:1.28.7-17.el9_4.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-17.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le" }, "product_reference": "cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-17.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x" }, "product_reference": "cups-filters-libs-0:1.28.7-17.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-17.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64" }, "product_reference": "cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-17.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64" }, "product_reference": "cups-filters-0:1.28.7-17.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-17.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le" }, "product_reference": "cups-filters-0:1.28.7-17.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-17.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x" }, "product_reference": "cups-filters-0:1.28.7-17.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-17.el9_4.src as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src" }, "product_reference": "cups-filters-0:1.28.7-17.el9_4.src", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-17.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64" }, "product_reference": "cups-filters-0:1.28.7-17.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64" }, "product_reference": "cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686" }, "product_reference": "cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le" }, "product_reference": "cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x" }, "product_reference": "cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-17.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64" }, "product_reference": "cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-17.el9_4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686" }, "product_reference": "cups-filters-devel-0:1.28.7-17.el9_4.i686", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-17.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le" }, "product_reference": "cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-17.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x" }, "product_reference": "cups-filters-devel-0:1.28.7-17.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-17.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64" }, "product_reference": "cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-17.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64" }, "product_reference": "cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-17.el9_4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686" }, "product_reference": "cups-filters-libs-0:1.28.7-17.el9_4.i686", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-17.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le" }, "product_reference": "cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-17.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x" }, "product_reference": "cups-filters-libs-0:1.28.7-17.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-17.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64" }, "product_reference": "cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-23T16:47:10.408000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314253" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenPrinting CUPS. In certain conditions, a remote attacker can add a malicious printer or directly hijack an existing printer by replacing the valid IPP URL with a malicious one. Also, it is possible that due to a lack of validation of IPP attributes returned by the server, this issue allows attacker-controlled data to be used on the rest of the CUPS system.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47076" }, { "category": "external", "summary": "RHBZ#2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/", "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-27T20:20:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7346" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes" }, { "cve": "CVE-2024-47175", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2024-09-23T16:57:36.269000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314256" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nThe ppdCreatePPDFromIPP2 function in libppd doesn\u0027t properly check or clean IPP attributes before writing them to a temporary PPD file. This means that a remote attacker, who has control of or has hijacked an exposed printer (through UPD or mDNS), could send a harmful IPP attribute and potentially insert malicious commands into the PPD file.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: libppd: remote command injection via attacker controlled data in PPD file", "title": "Vulnerability summary" }, { "category": "other", "text": "RHCOS and RHEL include libs-cups as a build-time dependency. However, the vulnerability is not exploitable with just the client libraries unless a print server based on OpenPrinting is actively running.\n\nRHEL and RHCOS does not have cups-browsed enabled by default so the impact for those are set to \u0027Low\u0027", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47175" }, { "category": "external", "summary": "RHBZ#2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47175", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6", "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-27T20:20:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7346" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups: libppd: remote command injection via attacker controlled data in PPD file" }, { "cve": "CVE-2024-47176", "cwe": { "id": "CWE-940", "name": "Improper Verification of Source of a Communication Channel" }, "discovery_date": "2024-09-23T16:37:23.865000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314252" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nA security issue was discovered in OpenPrinting CUPS. The `cups-browsed` component is responsible for discovering printers on a network and adding them to the system. In order to do so, the service uses two distinct protocols. For the first one, the service binds on all interfaces on UDP port 631 and accepts a custom packet from any untrusted source. This is exploitable from outside the LAN if the computer is exposed on the public internet. The service also listens for DNS-SD / mDNS advertisements trough AVAHI. In both cases, when a printer is discovered by either the UDP packet or mDNS, its IPP or IPPS url is automatically contacted by cups-browsed and a `Get-Printer-Attributes` request is sent to it which can leak potentially sensitive system information to an attacker via the User-Agent header.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source", "title": "Vulnerability summary" }, { "category": "other", "text": "The cups-browsed service is disabled by default on all versions of RHEL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47176" }, { "category": "external", "summary": "RHBZ#2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8", "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-27T20:20:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7346" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source" }, { "cve": "CVE-2024-47850", "discovery_date": "2024-10-04T05:00:52.670668+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316417" } ], "notes": [ { "category": "description", "text": "A flaw was found in cups-browsed. This vulnerability allows an attacker to launch DDoS amplification attacks via an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-47850 is resolved by the same fixes released for the related CVE-2024-47176.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47850" }, { "category": "external", "summary": "RHBZ#2316417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316417" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups", "url": "https://github.com/OpenPrinting/cups" }, { "category": "external", "summary": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat", "url": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat" } ], "release_date": "2024-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-27T20:20:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7346" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-devel-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-0:1.28.7-17.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.i686", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.28.7-17.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack" } ] }
rhsa-2024_7503
Vulnerability from csaf_redhat
Published
2024-10-02 12:00
Modified
2024-11-24 19:41
Summary
Red Hat Security Advisory: cups-filters security update
Notes
Topic
An update for cups-filters is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently.
Security Fix(es):
* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()
* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)
* cups: libppd: remote command injection via attacker controlled data in PPD file ()
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cups-filters is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. \n\nSecurity Fix(es):\n\n* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()\n\n* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)\n\n* cups: libppd: remote command injection via attacker controlled data in PPD file ()\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:7503", "url": "https://access.redhat.com/errata/RHSA-2024:7503" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7503.json" } ], "title": "Red Hat Security Advisory: cups-filters security update", "tracking": { "current_release_date": "2024-11-24T19:41:24+00:00", "generator": { "date": "2024-11-24T19:41:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:7503", "initial_release_date": "2024-10-02T12:00:43+00:00", "revision_history": [ { "date": "2024-10-02T12:00:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-02T12:00:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T19:41:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder EUS (v.9.2)", "product": { "name": "Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "product": { "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "product_id": "cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.28.7-11.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "product": { "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "product_id": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.28.7-11.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "product": { "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "product_id": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.28.7-11.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "product": { "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "product_id": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.28.7-11.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-0:1.28.7-11.el9_2.2.aarch64", "product": { "name": "cups-filters-0:1.28.7-11.el9_2.2.aarch64", "product_id": "cups-filters-0:1.28.7-11.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.28.7-11.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "product": { "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "product_id": "cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.28.7-11.el9_2.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "product": { "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "product_id": "cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.28.7-11.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "product": { "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "product_id": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.28.7-11.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "product": { "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "product_id": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.28.7-11.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "product": { "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "product_id": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.28.7-11.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "product": { "name": "cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "product_id": "cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.28.7-11.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "product": { "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "product_id": "cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.28.7-11.el9_2.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "product": { "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "product_id": "cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.28.7-11.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "product": { "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "product_id": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.28.7-11.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "product": { "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "product_id": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.28.7-11.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "product": { "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "product_id": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.28.7-11.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "product": { "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "product_id": "cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.28.7-11.el9_2.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "product": { "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "product_id": "cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.28.7-11.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "product": { "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "product_id": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.28.7-11.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "product": { "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "product_id": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.28.7-11.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "product": { "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "product_id": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.28.7-11.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-0:1.28.7-11.el9_2.2.x86_64", "product": { "name": "cups-filters-0:1.28.7-11.el9_2.2.x86_64", "product_id": "cups-filters-0:1.28.7-11.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.28.7-11.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "product": { "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "product_id": "cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.28.7-11.el9_2.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "product": { "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "product_id": "cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.28.7-11.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "product": { "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "product_id": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.28.7-11.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "product": { "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "product_id": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.28.7-11.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "product": { "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "product_id": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.28.7-11.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-0:1.28.7-11.el9_2.2.s390x", "product": { "name": "cups-filters-0:1.28.7-11.el9_2.2.s390x", "product_id": "cups-filters-0:1.28.7-11.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.28.7-11.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "product": { "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "product_id": "cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.28.7-11.el9_2.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.28.7-11.el9_2.2.src", "product": { "name": "cups-filters-0:1.28.7-11.el9_2.2.src", "product_id": "cups-filters-0:1.28.7-11.el9_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.28.7-11.el9_2.2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64" }, "product_reference": "cups-filters-0:1.28.7-11.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le" }, "product_reference": "cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x" }, "product_reference": "cups-filters-0:1.28.7-11.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-11.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src" }, "product_reference": "cups-filters-0:1.28.7-11.el9_2.2.src", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64" }, "product_reference": "cups-filters-0:1.28.7-11.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64" }, "product_reference": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686" }, "product_reference": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le" }, "product_reference": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x" }, "product_reference": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64" }, "product_reference": "cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686" }, "product_reference": "cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le" }, "product_reference": "cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x" }, "product_reference": "cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64" }, "product_reference": "cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64" }, "product_reference": "cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686" }, "product_reference": "cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le" }, "product_reference": "cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x" }, "product_reference": "cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64" }, "product_reference": "cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-11.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64" }, "product_reference": "cups-filters-0:1.28.7-11.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-11.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le" }, "product_reference": "cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-11.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x" }, "product_reference": "cups-filters-0:1.28.7-11.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-11.el9_2.2.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src" }, "product_reference": "cups-filters-0:1.28.7-11.el9_2.2.src", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-11.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64" }, "product_reference": "cups-filters-0:1.28.7-11.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64" }, "product_reference": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686" }, "product_reference": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le" }, "product_reference": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x" }, "product_reference": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64" }, "product_reference": "cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686" }, "product_reference": "cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le" }, "product_reference": "cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x" }, "product_reference": "cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64" }, "product_reference": "cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64" }, "product_reference": "cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686" }, "product_reference": "cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le" }, "product_reference": "cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x" }, "product_reference": "cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64" }, "product_reference": "cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-23T16:47:10.408000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314253" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenPrinting CUPS. In certain conditions, a remote attacker can add a malicious printer or directly hijack an existing printer by replacing the valid IPP URL with a malicious one. Also, it is possible that due to a lack of validation of IPP attributes returned by the server, this issue allows attacker-controlled data to be used on the rest of the CUPS system.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47076" }, { "category": "external", "summary": "RHBZ#2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/", "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T12:00:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7503" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes" }, { "cve": "CVE-2024-47175", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2024-09-23T16:57:36.269000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314256" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nThe ppdCreatePPDFromIPP2 function in libppd doesn\u0027t properly check or clean IPP attributes before writing them to a temporary PPD file. This means that a remote attacker, who has control of or has hijacked an exposed printer (through UPD or mDNS), could send a harmful IPP attribute and potentially insert malicious commands into the PPD file.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: libppd: remote command injection via attacker controlled data in PPD file", "title": "Vulnerability summary" }, { "category": "other", "text": "RHCOS and RHEL include libs-cups as a build-time dependency. However, the vulnerability is not exploitable with just the client libraries unless a print server based on OpenPrinting is actively running.\n\nRHEL and RHCOS does not have cups-browsed enabled by default so the impact for those are set to \u0027Low\u0027", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47175" }, { "category": "external", "summary": "RHBZ#2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47175", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6", "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T12:00:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7503" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups: libppd: remote command injection via attacker controlled data in PPD file" }, { "cve": "CVE-2024-47176", "cwe": { "id": "CWE-940", "name": "Improper Verification of Source of a Communication Channel" }, "discovery_date": "2024-09-23T16:37:23.865000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314252" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nA security issue was discovered in OpenPrinting CUPS. The `cups-browsed` component is responsible for discovering printers on a network and adding them to the system. In order to do so, the service uses two distinct protocols. For the first one, the service binds on all interfaces on UDP port 631 and accepts a custom packet from any untrusted source. This is exploitable from outside the LAN if the computer is exposed on the public internet. The service also listens for DNS-SD / mDNS advertisements trough AVAHI. In both cases, when a printer is discovered by either the UDP packet or mDNS, its IPP or IPPS url is automatically contacted by cups-browsed and a `Get-Printer-Attributes` request is sent to it which can leak potentially sensitive system information to an attacker via the User-Agent header.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source", "title": "Vulnerability summary" }, { "category": "other", "text": "The cups-browsed service is disabled by default on all versions of RHEL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47176" }, { "category": "external", "summary": "RHBZ#2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8", "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T12:00:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7503" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source" }, { "cve": "CVE-2024-47850", "discovery_date": "2024-10-04T05:00:52.670668+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316417" } ], "notes": [ { "category": "description", "text": "A flaw was found in cups-browsed. This vulnerability allows an attacker to launch DDoS amplification attacks via an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-47850 is resolved by the same fixes released for the related CVE-2024-47176.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47850" }, { "category": "external", "summary": "RHBZ#2316417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316417" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups", "url": "https://github.com/OpenPrinting/cups" }, { "category": "external", "summary": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat", "url": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat" } ], "release_date": "2024-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T12:00:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7503" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "AppStream-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.src", "CRB-9.2.0.Z.EUS:cups-filters-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debuginfo-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-debugsource-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-devel-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-0:1.28.7-11.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.i686", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:cups-filters-libs-debuginfo-0:1.28.7-11.el9_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack" } ] }
rhsa-2024_7506
Vulnerability from csaf_redhat
Published
2024-10-02 11:35
Modified
2024-11-24 19:41
Summary
Red Hat Security Advisory: cups-filters security update
Notes
Topic
An update for cups-filters is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently.
Security Fix(es):
* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()
* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)
* cups: libppd: remote command injection via attacker controlled data in PPD file ()
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cups-filters is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. \n\nSecurity Fix(es):\n\n* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()\n\n* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)\n\n* cups: libppd: remote command injection via attacker controlled data in PPD file ()\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:7506", "url": "https://access.redhat.com/errata/RHSA-2024:7506" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7506.json" } ], "title": "Red Hat Security Advisory: cups-filters security update", "tracking": { "current_release_date": "2024-11-24T19:41:04+00:00", "generator": { "date": "2024-11-24T19:41:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:7506", "initial_release_date": "2024-10-02T11:35:03+00:00", "revision_history": [ { "date": "2024-10-02T11:35:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-02T11:35:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T19:41:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.28.7-10.el9_0.2.src", "product": { "name": "cups-filters-0:1.28.7-10.el9_0.2.src", "product_id": "cups-filters-0:1.28.7-10.el9_0.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.28.7-10.el9_0.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.28.7-10.el9_0.2.aarch64", "product": { "name": "cups-filters-0:1.28.7-10.el9_0.2.aarch64", "product_id": "cups-filters-0:1.28.7-10.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.28.7-10.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "product": { "name": "cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "product_id": "cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.28.7-10.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "product": { "name": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "product_id": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.28.7-10.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "product": { "name": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "product_id": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.28.7-10.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "product": { "name": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "product_id": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.28.7-10.el9_0.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "product": { "name": "cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "product_id": "cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.28.7-10.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "product": { "name": "cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "product_id": "cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.28.7-10.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "product": { "name": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "product_id": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.28.7-10.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "product": { "name": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "product_id": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.28.7-10.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "product": { "name": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "product_id": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.28.7-10.el9_0.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.28.7-10.el9_0.2.x86_64", "product": { "name": "cups-filters-0:1.28.7-10.el9_0.2.x86_64", "product_id": "cups-filters-0:1.28.7-10.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.28.7-10.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "product": { "name": "cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "product_id": "cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.28.7-10.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "product": { "name": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "product_id": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.28.7-10.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "product": { "name": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "product_id": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.28.7-10.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "product": { "name": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "product_id": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.28.7-10.el9_0.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "product": { "name": "cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "product_id": "cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.28.7-10.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "product": { "name": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "product_id": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.28.7-10.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "product": { "name": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "product_id": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.28.7-10.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "product": { "name": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "product_id": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.28.7-10.el9_0.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.28.7-10.el9_0.2.s390x", "product": { "name": "cups-filters-0:1.28.7-10.el9_0.2.s390x", "product_id": "cups-filters-0:1.28.7-10.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.28.7-10.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "product": { "name": "cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "product_id": "cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.28.7-10.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "product": { "name": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "product_id": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.28.7-10.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "product": { "name": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "product_id": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.28.7-10.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "product": { "name": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "product_id": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.28.7-10.el9_0.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-10.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64" }, "product_reference": "cups-filters-0:1.28.7-10.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-10.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le" }, "product_reference": "cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-10.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x" }, "product_reference": "cups-filters-0:1.28.7-10.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-10.el9_0.2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src" }, "product_reference": "cups-filters-0:1.28.7-10.el9_0.2.src", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.28.7-10.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64" }, "product_reference": "cups-filters-0:1.28.7-10.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64" }, "product_reference": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686" }, "product_reference": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le" }, "product_reference": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x" }, "product_reference": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64" }, "product_reference": "cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-10.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686" }, "product_reference": "cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le" }, "product_reference": "cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-10.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x" }, "product_reference": "cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64" }, "product_reference": "cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-23T16:47:10.408000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314253" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenPrinting CUPS. In certain conditions, a remote attacker can add a malicious printer or directly hijack an existing printer by replacing the valid IPP URL with a malicious one. Also, it is possible that due to a lack of validation of IPP attributes returned by the server, this issue allows attacker-controlled data to be used on the rest of the CUPS system.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47076" }, { "category": "external", "summary": "RHBZ#2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/", "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T11:35:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7506" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes" }, { "cve": "CVE-2024-47175", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2024-09-23T16:57:36.269000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314256" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nThe ppdCreatePPDFromIPP2 function in libppd doesn\u0027t properly check or clean IPP attributes before writing them to a temporary PPD file. This means that a remote attacker, who has control of or has hijacked an exposed printer (through UPD or mDNS), could send a harmful IPP attribute and potentially insert malicious commands into the PPD file.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: libppd: remote command injection via attacker controlled data in PPD file", "title": "Vulnerability summary" }, { "category": "other", "text": "RHCOS and RHEL include libs-cups as a build-time dependency. However, the vulnerability is not exploitable with just the client libraries unless a print server based on OpenPrinting is actively running.\n\nRHEL and RHCOS does not have cups-browsed enabled by default so the impact for those are set to \u0027Low\u0027", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47175" }, { "category": "external", "summary": "RHBZ#2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47175", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6", "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T11:35:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7506" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups: libppd: remote command injection via attacker controlled data in PPD file" }, { "cve": "CVE-2024-47176", "cwe": { "id": "CWE-940", "name": "Improper Verification of Source of a Communication Channel" }, "discovery_date": "2024-09-23T16:37:23.865000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314252" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nA security issue was discovered in OpenPrinting CUPS. The `cups-browsed` component is responsible for discovering printers on a network and adding them to the system. In order to do so, the service uses two distinct protocols. For the first one, the service binds on all interfaces on UDP port 631 and accepts a custom packet from any untrusted source. This is exploitable from outside the LAN if the computer is exposed on the public internet. The service also listens for DNS-SD / mDNS advertisements trough AVAHI. In both cases, when a printer is discovered by either the UDP packet or mDNS, its IPP or IPPS url is automatically contacted by cups-browsed and a `Get-Printer-Attributes` request is sent to it which can leak potentially sensitive system information to an attacker via the User-Agent header.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source", "title": "Vulnerability summary" }, { "category": "other", "text": "The cups-browsed service is disabled by default on all versions of RHEL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47176" }, { "category": "external", "summary": "RHBZ#2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8", "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T11:35:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7506" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source" }, { "cve": "CVE-2024-47850", "discovery_date": "2024-10-04T05:00:52.670668+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316417" } ], "notes": [ { "category": "description", "text": "A flaw was found in cups-browsed. This vulnerability allows an attacker to launch DDoS amplification attacks via an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-47850 is resolved by the same fixes released for the related CVE-2024-47176.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47850" }, { "category": "external", "summary": "RHBZ#2316417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316417" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups", "url": "https://github.com/OpenPrinting/cups" }, { "category": "external", "summary": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat", "url": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat" } ], "release_date": "2024-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T11:35:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7506" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.src", "AppStream-9.0.0.Z.E4S:cups-filters-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debuginfo-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-debugsource-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-0:1.28.7-10.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:cups-filters-libs-debuginfo-0:1.28.7-10.el9_0.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack" } ] }
rhsa-2024_7553
Vulnerability from csaf_redhat
Published
2024-10-02 18:32
Modified
2024-11-24 19:41
Summary
Red Hat Security Advisory: cups-filters security update
Notes
Topic
An update for cups-filters is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7-ELS Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cups-filters is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7-ELS Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:7553", "url": "https://access.redhat.com/errata/RHSA-2024:7553" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/7-ELS/html/7-ELS_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/7-ELS/html/7-ELS_release_notes/index" }, { "category": "external", "summary": "2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7553.json" } ], "title": "Red Hat Security Advisory: cups-filters security update", "tracking": { "current_release_date": "2024-11-24T19:41:33+00:00", "generator": { "date": "2024-11-24T19:41:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:7553", "initial_release_date": "2024-10-02T18:32:49+00:00", "revision_history": [ { "date": "2024-10-02T18:32:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-02T18:32:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T19:41:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.0.35-29.el7_9.3.src", "product": { "name": "cups-filters-0:1.0.35-29.el7_9.3.src", "product_id": "cups-filters-0:1.0.35-29.el7_9.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.0.35-29.el7_9.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.0.35-29.el7_9.3.x86_64", "product": { "name": "cups-filters-0:1.0.35-29.el7_9.3.x86_64", "product_id": "cups-filters-0:1.0.35-29.el7_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.0.35-29.el7_9.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "product": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "product_id": "cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.0.35-29.el7_9.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "product": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "product_id": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.0.35-29.el7_9.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "product": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "product_id": "cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.0.35-29.el7_9.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "product": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "product_id": "cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.0.35-29.el7_9.3?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "product": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "product_id": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.0.35-29.el7_9.3?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "product": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "product_id": "cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.0.35-29.el7_9.3?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "product": { "name": "cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "product_id": "cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.0.35-29.el7_9.3?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "product": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "product_id": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.0.35-29.el7_9.3?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "product": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "product_id": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.0.35-29.el7_9.3?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "product": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "product_id": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.0.35-29.el7_9.3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.0.35-29.el7_9.3.ppc64", "product": { "name": "cups-filters-0:1.0.35-29.el7_9.3.ppc64", "product_id": "cups-filters-0:1.0.35-29.el7_9.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.0.35-29.el7_9.3?arch=ppc64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "product": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "product_id": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.0.35-29.el7_9.3?arch=ppc64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "product": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "product_id": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.0.35-29.el7_9.3?arch=ppc64" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "product": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "product_id": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.0.35-29.el7_9.3?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "product": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "product_id": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.0.35-29.el7_9.3?arch=ppc" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "product": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "product_id": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.0.35-29.el7_9.3?arch=ppc" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "product": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "product_id": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.0.35-29.el7_9.3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.0.35-29.el7_9.3.s390x", "product": { "name": "cups-filters-0:1.0.35-29.el7_9.3.s390x", "product_id": "cups-filters-0:1.0.35-29.el7_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.0.35-29.el7_9.3?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "product": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "product_id": "cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.0.35-29.el7_9.3?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "product": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "product_id": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.0.35-29.el7_9.3?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "product": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "product_id": "cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.0.35-29.el7_9.3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "product": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "product_id": "cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.0.35-29.el7_9.3?arch=s390" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "product": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "product_id": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.0.35-29.el7_9.3?arch=s390" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "product": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "product_id": "cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.0.35-29.el7_9.3?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-29.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64" }, "product_reference": "cups-filters-0:1.0.35-29.el7_9.3.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-29.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le" }, "product_reference": "cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-29.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x" }, "product_reference": "cups-filters-0:1.0.35-29.el7_9.3.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-29.el7_9.3.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src" }, "product_reference": "cups-filters-0:1.0.35-29.el7_9.3.src", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-29.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64" }, "product_reference": "cups-filters-0:1.0.35-29.el7_9.3.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686" }, "product_reference": "cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc" }, "product_reference": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64" }, "product_reference": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le" }, "product_reference": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390" }, "product_reference": "cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x" }, "product_reference": "cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64" }, "product_reference": "cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686" }, "product_reference": "cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc" }, "product_reference": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64" }, "product_reference": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le" }, "product_reference": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390" }, "product_reference": "cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x" }, "product_reference": "cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" }, "product_reference": "cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-29.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64" }, "product_reference": "cups-filters-0:1.0.35-29.el7_9.3.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-29.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le" }, "product_reference": "cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-29.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x" }, "product_reference": "cups-filters-0:1.0.35-29.el7_9.3.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-29.el7_9.3.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src" }, "product_reference": "cups-filters-0:1.0.35-29.el7_9.3.src", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-29.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64" }, "product_reference": "cups-filters-0:1.0.35-29.el7_9.3.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686" }, "product_reference": "cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc" }, "product_reference": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64" }, "product_reference": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le" }, "product_reference": "cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390" }, "product_reference": "cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x" }, "product_reference": "cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64" }, "product_reference": "cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686" }, "product_reference": "cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc" }, "product_reference": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64" }, "product_reference": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le" }, "product_reference": "cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390" }, "product_reference": "cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x" }, "product_reference": "cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" }, "product_reference": "cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "relates_to_product_reference": "7Server-optional-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-23T16:47:10.408000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314253" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenPrinting CUPS. In certain conditions, a remote attacker can add a malicious printer or directly hijack an existing printer by replacing the valid IPP URL with a malicious one. Also, it is possible that due to a lack of validation of IPP attributes returned by the server, this issue allows attacker-controlled data to be used on the rest of the CUPS system.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47076" }, { "category": "external", "summary": "RHBZ#2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/", "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T18:32:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7553" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes" }, { "cve": "CVE-2024-47175", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2024-09-23T16:57:36.269000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314256" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nThe ppdCreatePPDFromIPP2 function in libppd doesn\u0027t properly check or clean IPP attributes before writing them to a temporary PPD file. This means that a remote attacker, who has control of or has hijacked an exposed printer (through UPD or mDNS), could send a harmful IPP attribute and potentially insert malicious commands into the PPD file.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: libppd: remote command injection via attacker controlled data in PPD file", "title": "Vulnerability summary" }, { "category": "other", "text": "RHCOS and RHEL include libs-cups as a build-time dependency. However, the vulnerability is not exploitable with just the client libraries unless a print server based on OpenPrinting is actively running.\n\nRHEL and RHCOS does not have cups-browsed enabled by default so the impact for those are set to \u0027Low\u0027", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47175" }, { "category": "external", "summary": "RHBZ#2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47175", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6", "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T18:32:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7553" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups: libppd: remote command injection via attacker controlled data in PPD file" }, { "cve": "CVE-2024-47176", "cwe": { "id": "CWE-940", "name": "Improper Verification of Source of a Communication Channel" }, "discovery_date": "2024-09-23T16:37:23.865000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314252" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nA security issue was discovered in OpenPrinting CUPS. The `cups-browsed` component is responsible for discovering printers on a network and adding them to the system. In order to do so, the service uses two distinct protocols. For the first one, the service binds on all interfaces on UDP port 631 and accepts a custom packet from any untrusted source. This is exploitable from outside the LAN if the computer is exposed on the public internet. The service also listens for DNS-SD / mDNS advertisements trough AVAHI. In both cases, when a printer is discovered by either the UDP packet or mDNS, its IPP or IPPS url is automatically contacted by cups-browsed and a `Get-Printer-Attributes` request is sent to it which can leak potentially sensitive system information to an attacker via the User-Agent header.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source", "title": "Vulnerability summary" }, { "category": "other", "text": "The cups-browsed service is disabled by default on all versions of RHEL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47176" }, { "category": "external", "summary": "RHBZ#2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8", "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T18:32:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7553" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source" }, { "cve": "CVE-2024-47850", "discovery_date": "2024-10-04T05:00:52.670668+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316417" } ], "notes": [ { "category": "description", "text": "A flaw was found in cups-browsed. This vulnerability allows an attacker to launch DDoS amplification attacks via an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-47850 is resolved by the same fixes released for the related CVE-2024-47176.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47850" }, { "category": "external", "summary": "RHBZ#2316417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316417" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups", "url": "https://github.com/OpenPrinting/cups" }, { "category": "external", "summary": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat", "url": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat" } ], "release_date": "2024-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T18:32:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7553" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.src", "7Server-optional-ELS:cups-filters-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-debuginfo-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-devel-0:1.0.35-29.el7_9.3.x86_64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.i686", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.ppc64le", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.s390x", "7Server-optional-ELS:cups-filters-libs-0:1.0.35-29.el7_9.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack" } ] }
rhsa-2024_7551
Vulnerability from csaf_redhat
Published
2024-10-02 18:21
Modified
2024-11-24 19:41
Summary
Red Hat Security Advisory: cups-filters security update
Notes
Topic
An update for cups-filters is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently.
Security Fix(es):
* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()
* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)
* cups: libppd: remote command injection via attacker controlled data in PPD file ()
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cups-filters is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. \n\nSecurity Fix(es):\n\n* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()\n\n* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)\n\n* cups: libppd: remote command injection via attacker controlled data in PPD file ()\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:7551", "url": "https://access.redhat.com/errata/RHSA-2024:7551" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7551.json" } ], "title": "Red Hat Security Advisory: cups-filters security update", "tracking": { "current_release_date": "2024-11-24T19:41:42+00:00", "generator": { "date": "2024-11-24T19:41:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:7551", "initial_release_date": "2024-10-02T18:21:54+00:00", "revision_history": [ { "date": "2024-10-02T18:21:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-02T18:21:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T19:41:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.0.35-26.el7_7.3.src", "product": { "name": "cups-filters-0:1.0.35-26.el7_7.3.src", "product_id": "cups-filters-0:1.0.35-26.el7_7.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.0.35-26.el7_7.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.0.35-26.el7_7.3.x86_64", "product": { "name": "cups-filters-0:1.0.35-26.el7_7.3.x86_64", "product_id": "cups-filters-0:1.0.35-26.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.0.35-26.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "product": { "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "product_id": "cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.0.35-26.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "product": { "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "product_id": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.0.35-26.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "product": { "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "product_id": "cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.0.35-26.el7_7.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "product": { "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "product_id": "cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.0.35-26.el7_7.3?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "product": { "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "product_id": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.0.35-26.el7_7.3?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "product": { "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "product_id": "cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.0.35-26.el7_7.3?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-26.el7_7.3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src" }, "product_reference": "cups-filters-0:1.0.35-26.el7_7.3.src", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686" }, "product_reference": "cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686" }, "product_reference": "cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-26.el7_7.3.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src" }, "product_reference": "cups-filters-0:1.0.35-26.el7_7.3.src", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686" }, "product_reference": "cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686" }, "product_reference": "cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-23T16:47:10.408000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314253" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenPrinting CUPS. In certain conditions, a remote attacker can add a malicious printer or directly hijack an existing printer by replacing the valid IPP URL with a malicious one. Also, it is possible that due to a lack of validation of IPP attributes returned by the server, this issue allows attacker-controlled data to be used on the rest of the CUPS system.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47076" }, { "category": "external", "summary": "RHBZ#2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/", "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T18:21:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7551" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes" }, { "cve": "CVE-2024-47175", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2024-09-23T16:57:36.269000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314256" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nThe ppdCreatePPDFromIPP2 function in libppd doesn\u0027t properly check or clean IPP attributes before writing them to a temporary PPD file. This means that a remote attacker, who has control of or has hijacked an exposed printer (through UPD or mDNS), could send a harmful IPP attribute and potentially insert malicious commands into the PPD file.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: libppd: remote command injection via attacker controlled data in PPD file", "title": "Vulnerability summary" }, { "category": "other", "text": "RHCOS and RHEL include libs-cups as a build-time dependency. However, the vulnerability is not exploitable with just the client libraries unless a print server based on OpenPrinting is actively running.\n\nRHEL and RHCOS does not have cups-browsed enabled by default so the impact for those are set to \u0027Low\u0027", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47175" }, { "category": "external", "summary": "RHBZ#2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47175", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6", "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T18:21:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7551" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups: libppd: remote command injection via attacker controlled data in PPD file" }, { "cve": "CVE-2024-47176", "cwe": { "id": "CWE-940", "name": "Improper Verification of Source of a Communication Channel" }, "discovery_date": "2024-09-23T16:37:23.865000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314252" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nA security issue was discovered in OpenPrinting CUPS. The `cups-browsed` component is responsible for discovering printers on a network and adding them to the system. In order to do so, the service uses two distinct protocols. For the first one, the service binds on all interfaces on UDP port 631 and accepts a custom packet from any untrusted source. This is exploitable from outside the LAN if the computer is exposed on the public internet. The service also listens for DNS-SD / mDNS advertisements trough AVAHI. In both cases, when a printer is discovered by either the UDP packet or mDNS, its IPP or IPPS url is automatically contacted by cups-browsed and a `Get-Printer-Attributes` request is sent to it which can leak potentially sensitive system information to an attacker via the User-Agent header.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source", "title": "Vulnerability summary" }, { "category": "other", "text": "The cups-browsed service is disabled by default on all versions of RHEL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47176" }, { "category": "external", "summary": "RHBZ#2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8", "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T18:21:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7551" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source" }, { "cve": "CVE-2024-47850", "discovery_date": "2024-10-04T05:00:52.670668+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316417" } ], "notes": [ { "category": "description", "text": "A flaw was found in cups-browsed. This vulnerability allows an attacker to launch DDoS amplification attacks via an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-47850 is resolved by the same fixes released for the related CVE-2024-47176.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47850" }, { "category": "external", "summary": "RHBZ#2316417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316417" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups", "url": "https://github.com/OpenPrinting/cups" }, { "category": "external", "summary": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat", "url": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat" } ], "release_date": "2024-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T18:21:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7551" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack" } ] }
rhsa-2024_7623
Vulnerability from csaf_redhat
Published
2024-10-03 11:27
Modified
2024-11-24 19:41
Summary
Red Hat Security Advisory: cups-filters security update
Notes
Topic
An update for cups-filters is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently.
Security Fix(es):
* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()
* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)
* cups: libppd: remote command injection via attacker controlled data in PPD file ()
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cups-filters is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. \n\nSecurity Fix(es):\n\n* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()\n\n* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)\n\n* cups: libppd: remote command injection via attacker controlled data in PPD file ()\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:7623", "url": "https://access.redhat.com/errata/RHSA-2024:7623" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7623.json" } ], "title": "Red Hat Security Advisory: cups-filters security update", "tracking": { "current_release_date": "2024-11-24T19:41:53+00:00", "generator": { "date": "2024-11-24T19:41:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:7623", "initial_release_date": "2024-10-03T11:27:46+00:00", "revision_history": [ { "date": "2024-10-03T11:27:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-03T11:27:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T19:41:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-27.el8_6.3.src", "product": { "name": "cups-filters-0:1.20.0-27.el8_6.3.src", "product_id": "cups-filters-0:1.20.0-27.el8_6.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-27.el8_6.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-27.el8_6.3.x86_64", "product": { "name": "cups-filters-0:1.20.0-27.el8_6.3.x86_64", "product_id": "cups-filters-0:1.20.0-27.el8_6.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-27.el8_6.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "product": { "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "product_id": "cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-27.el8_6.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "product": { "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "product_id": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-27.el8_6.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "product": { "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "product_id": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-27.el8_6.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-27.el8_6.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "product": { "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "product_id": "cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-27.el8_6.3?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "product": { "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "product_id": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-27.el8_6.3?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "product": { "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "product_id": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-27.el8_6.3?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-27.el8_6.3?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-27.el8_6.3.aarch64", "product": { "name": "cups-filters-0:1.20.0-27.el8_6.3.aarch64", "product_id": "cups-filters-0:1.20.0-27.el8_6.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-27.el8_6.3?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "product": { "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "product_id": "cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-27.el8_6.3?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "product": { "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "product_id": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-27.el8_6.3?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "product": { "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "product_id": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-27.el8_6.3?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-27.el8_6.3?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "product": { "name": "cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "product_id": "cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-27.el8_6.3?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "product": { "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "product_id": "cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-27.el8_6.3?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "product": { "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "product_id": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-27.el8_6.3?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "product": { "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "product_id": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-27.el8_6.3?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-27.el8_6.3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-27.el8_6.3.s390x", "product": { "name": "cups-filters-0:1.20.0-27.el8_6.3.s390x", "product_id": "cups-filters-0:1.20.0-27.el8_6.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-27.el8_6.3?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "product": { "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "product_id": "cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-27.el8_6.3?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "product": { "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "product_id": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-27.el8_6.3?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "product": { "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "product_id": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-27.el8_6.3?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-27.el8_6.3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-27.el8_6.3.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src" }, "product_reference": "cups-filters-0:1.20.0-27.el8_6.3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-27.el8_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64" }, "product_reference": "cups-filters-0:1.20.0-27.el8_6.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686" }, "product_reference": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686" }, "product_reference": "cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64" }, "product_reference": "cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-27.el8_6.3.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64" }, "product_reference": "cups-filters-0:1.20.0-27.el8_6.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-27.el8_6.3.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le" }, "product_reference": "cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-27.el8_6.3.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x" }, "product_reference": "cups-filters-0:1.20.0-27.el8_6.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-27.el8_6.3.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src" }, "product_reference": "cups-filters-0:1.20.0-27.el8_6.3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-27.el8_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64" }, "product_reference": "cups-filters-0:1.20.0-27.el8_6.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686" }, "product_reference": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le" }, "product_reference": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x" }, "product_reference": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64" }, "product_reference": "cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686" }, "product_reference": "cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le" }, "product_reference": "cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x" }, "product_reference": "cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64" }, "product_reference": "cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-27.el8_6.3.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src" }, "product_reference": "cups-filters-0:1.20.0-27.el8_6.3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-27.el8_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64" }, "product_reference": "cups-filters-0:1.20.0-27.el8_6.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686" }, "product_reference": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686" }, "product_reference": "cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64" }, "product_reference": "cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-23T16:47:10.408000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314253" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenPrinting CUPS. In certain conditions, a remote attacker can add a malicious printer or directly hijack an existing printer by replacing the valid IPP URL with a malicious one. Also, it is possible that due to a lack of validation of IPP attributes returned by the server, this issue allows attacker-controlled data to be used on the rest of the CUPS system.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47076" }, { "category": "external", "summary": "RHBZ#2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/", "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-03T11:27:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7623" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes" }, { "cve": "CVE-2024-47175", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2024-09-23T16:57:36.269000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314256" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nThe ppdCreatePPDFromIPP2 function in libppd doesn\u0027t properly check or clean IPP attributes before writing them to a temporary PPD file. This means that a remote attacker, who has control of or has hijacked an exposed printer (through UPD or mDNS), could send a harmful IPP attribute and potentially insert malicious commands into the PPD file.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: libppd: remote command injection via attacker controlled data in PPD file", "title": "Vulnerability summary" }, { "category": "other", "text": "RHCOS and RHEL include libs-cups as a build-time dependency. However, the vulnerability is not exploitable with just the client libraries unless a print server based on OpenPrinting is actively running.\n\nRHEL and RHCOS does not have cups-browsed enabled by default so the impact for those are set to \u0027Low\u0027", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47175" }, { "category": "external", "summary": "RHBZ#2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47175", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6", "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-03T11:27:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7623" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups: libppd: remote command injection via attacker controlled data in PPD file" }, { "cve": "CVE-2024-47176", "cwe": { "id": "CWE-940", "name": "Improper Verification of Source of a Communication Channel" }, "discovery_date": "2024-09-23T16:37:23.865000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314252" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nA security issue was discovered in OpenPrinting CUPS. The `cups-browsed` component is responsible for discovering printers on a network and adding them to the system. In order to do so, the service uses two distinct protocols. For the first one, the service binds on all interfaces on UDP port 631 and accepts a custom packet from any untrusted source. This is exploitable from outside the LAN if the computer is exposed on the public internet. The service also listens for DNS-SD / mDNS advertisements trough AVAHI. In both cases, when a printer is discovered by either the UDP packet or mDNS, its IPP or IPPS url is automatically contacted by cups-browsed and a `Get-Printer-Attributes` request is sent to it which can leak potentially sensitive system information to an attacker via the User-Agent header.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source", "title": "Vulnerability summary" }, { "category": "other", "text": "The cups-browsed service is disabled by default on all versions of RHEL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47176" }, { "category": "external", "summary": "RHBZ#2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8", "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-03T11:27:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7623" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source" }, { "cve": "CVE-2024-47850", "discovery_date": "2024-10-04T05:00:52.670668+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316417" } ], "notes": [ { "category": "description", "text": "A flaw was found in cups-browsed. This vulnerability allows an attacker to launch DDoS amplification attacks via an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-47850 is resolved by the same fixes released for the related CVE-2024-47176.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47850" }, { "category": "external", "summary": "RHBZ#2316417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316417" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups", "url": "https://github.com/OpenPrinting/cups" }, { "category": "external", "summary": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat", "url": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat" } ], "release_date": "2024-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-03T11:27:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7623" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.AUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.E4S:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.aarch64", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.ppc64le", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.s390x", "AppStream-8.6.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.src", "AppStream-8.6.0.Z.TUS:cups-filters-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-debugsource-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-0:1.20.0-27.el8_6.3.x86_64", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.i686", "AppStream-8.6.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-27.el8_6.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack" } ] }
rhsa-2024_7463
Vulnerability from csaf_redhat
Published
2024-10-01 18:38
Modified
2024-11-24 19:40
Summary
Red Hat Security Advisory: cups-filters security update
Notes
Topic
An update for cups-filters is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently.
Security Fix(es):
* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()
* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)
* cups: libppd: remote command injection via attacker controlled data in PPD file ()
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cups-filters is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. \n\nSecurity Fix(es):\n\n* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()\n\n* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)\n\n* cups: libppd: remote command injection via attacker controlled data in PPD file ()\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:7463", "url": "https://access.redhat.com/errata/RHSA-2024:7463" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7463.json" } ], "title": "Red Hat Security Advisory: cups-filters security update", "tracking": { "current_release_date": "2024-11-24T19:40:36+00:00", "generator": { "date": "2024-11-24T19:40:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:7463", "initial_release_date": "2024-10-01T18:38:16+00:00", "revision_history": [ { "date": "2024-10-01T18:38:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-01T18:38:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T19:40:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 8)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-35.el8_10.src", "product": { "name": "cups-filters-0:1.20.0-35.el8_10.src", "product_id": "cups-filters-0:1.20.0-35.el8_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-35.el8_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-35.el8_10.aarch64", "product": { "name": "cups-filters-0:1.20.0-35.el8_10.aarch64", "product_id": "cups-filters-0:1.20.0-35.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-35.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "product": { "name": "cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "product_id": "cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-35.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "product": { "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "product_id": "cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-35.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "product": { "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "product_id": "cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-35.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-35.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "product": { "name": "cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "product_id": "cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.20.0-35.el8_10?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-35.el8_10.ppc64le", "product": { "name": "cups-filters-0:1.20.0-35.el8_10.ppc64le", "product_id": "cups-filters-0:1.20.0-35.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-35.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "product": { "name": "cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "product_id": "cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-35.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "product": { "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "product_id": "cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-35.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "product": { "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "product_id": "cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-35.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-35.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "product": { "name": "cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "product_id": "cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.20.0-35.el8_10?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-35.el8_10.x86_64", "product": { "name": "cups-filters-0:1.20.0-35.el8_10.x86_64", "product_id": "cups-filters-0:1.20.0-35.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-35.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "product": { "name": "cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "product_id": "cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-35.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "product": { "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "product_id": "cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-35.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "product": { "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "product_id": "cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-35.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-35.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "product": { "name": "cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "product_id": "cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.20.0-35.el8_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-35.el8_10.i686", "product": { "name": "cups-filters-libs-0:1.20.0-35.el8_10.i686", "product_id": "cups-filters-libs-0:1.20.0-35.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-35.el8_10?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "product": { "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "product_id": "cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-35.el8_10?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "product": { "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "product_id": "cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-35.el8_10?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-35.el8_10?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.20.0-35.el8_10.i686", "product": { "name": "cups-filters-devel-0:1.20.0-35.el8_10.i686", "product_id": "cups-filters-devel-0:1.20.0-35.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.20.0-35.el8_10?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-35.el8_10.s390x", "product": { "name": "cups-filters-0:1.20.0-35.el8_10.s390x", "product_id": "cups-filters-0:1.20.0-35.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-35.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-35.el8_10.s390x", "product": { "name": "cups-filters-libs-0:1.20.0-35.el8_10.s390x", "product_id": "cups-filters-libs-0:1.20.0-35.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-35.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "product": { "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "product_id": "cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-35.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "product": { "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "product_id": "cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-35.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-35.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.20.0-35.el8_10.s390x", "product": { "name": "cups-filters-devel-0:1.20.0-35.el8_10.s390x", "product_id": "cups-filters-devel-0:1.20.0-35.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.20.0-35.el8_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-35.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64" }, "product_reference": "cups-filters-0:1.20.0-35.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-35.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le" }, "product_reference": "cups-filters-0:1.20.0-35.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-35.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x" }, "product_reference": "cups-filters-0:1.20.0-35.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-35.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src" }, "product_reference": "cups-filters-0:1.20.0-35.el8_10.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-35.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64" }, "product_reference": "cups-filters-0:1.20.0-35.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686" }, "product_reference": "cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le" }, "product_reference": "cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x" }, "product_reference": "cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-35.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64" }, "product_reference": "cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-35.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686" }, "product_reference": "cups-filters-devel-0:1.20.0-35.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-35.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le" }, "product_reference": "cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-35.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x" }, "product_reference": "cups-filters-devel-0:1.20.0-35.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-35.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64" }, "product_reference": "cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-35.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64" }, "product_reference": "cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-35.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686" }, "product_reference": "cups-filters-libs-0:1.20.0-35.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-35.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le" }, "product_reference": "cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-35.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x" }, "product_reference": "cups-filters-libs-0:1.20.0-35.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-35.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64" }, "product_reference": "cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-35.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64" }, "product_reference": "cups-filters-0:1.20.0-35.el8_10.aarch64", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-35.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le" }, "product_reference": "cups-filters-0:1.20.0-35.el8_10.ppc64le", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-35.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x" }, "product_reference": "cups-filters-0:1.20.0-35.el8_10.s390x", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-35.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src" }, "product_reference": "cups-filters-0:1.20.0-35.el8_10.src", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-35.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64" }, "product_reference": "cups-filters-0:1.20.0-35.el8_10.x86_64", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686" }, "product_reference": "cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le" }, "product_reference": "cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x" }, "product_reference": "cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-35.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64" }, "product_reference": "cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-35.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686" }, "product_reference": "cups-filters-devel-0:1.20.0-35.el8_10.i686", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-35.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le" }, "product_reference": "cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-35.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x" }, "product_reference": "cups-filters-devel-0:1.20.0-35.el8_10.s390x", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-35.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64" }, "product_reference": "cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-35.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64" }, "product_reference": "cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-35.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686" }, "product_reference": "cups-filters-libs-0:1.20.0-35.el8_10.i686", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-35.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le" }, "product_reference": "cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-35.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x" }, "product_reference": "cups-filters-libs-0:1.20.0-35.el8_10.s390x", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-35.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64" }, "product_reference": "cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-23T16:47:10.408000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314253" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenPrinting CUPS. In certain conditions, a remote attacker can add a malicious printer or directly hijack an existing printer by replacing the valid IPP URL with a malicious one. Also, it is possible that due to a lack of validation of IPP attributes returned by the server, this issue allows attacker-controlled data to be used on the rest of the CUPS system.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47076" }, { "category": "external", "summary": "RHBZ#2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/", "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-01T18:38:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7463" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes" }, { "cve": "CVE-2024-47175", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2024-09-23T16:57:36.269000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314256" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nThe ppdCreatePPDFromIPP2 function in libppd doesn\u0027t properly check or clean IPP attributes before writing them to a temporary PPD file. This means that a remote attacker, who has control of or has hijacked an exposed printer (through UPD or mDNS), could send a harmful IPP attribute and potentially insert malicious commands into the PPD file.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: libppd: remote command injection via attacker controlled data in PPD file", "title": "Vulnerability summary" }, { "category": "other", "text": "RHCOS and RHEL include libs-cups as a build-time dependency. However, the vulnerability is not exploitable with just the client libraries unless a print server based on OpenPrinting is actively running.\n\nRHEL and RHCOS does not have cups-browsed enabled by default so the impact for those are set to \u0027Low\u0027", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47175" }, { "category": "external", "summary": "RHBZ#2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47175", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6", "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-01T18:38:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7463" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups: libppd: remote command injection via attacker controlled data in PPD file" }, { "cve": "CVE-2024-47176", "cwe": { "id": "CWE-940", "name": "Improper Verification of Source of a Communication Channel" }, "discovery_date": "2024-09-23T16:37:23.865000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314252" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nA security issue was discovered in OpenPrinting CUPS. The `cups-browsed` component is responsible for discovering printers on a network and adding them to the system. In order to do so, the service uses two distinct protocols. For the first one, the service binds on all interfaces on UDP port 631 and accepts a custom packet from any untrusted source. This is exploitable from outside the LAN if the computer is exposed on the public internet. The service also listens for DNS-SD / mDNS advertisements trough AVAHI. In both cases, when a printer is discovered by either the UDP packet or mDNS, its IPP or IPPS url is automatically contacted by cups-browsed and a `Get-Printer-Attributes` request is sent to it which can leak potentially sensitive system information to an attacker via the User-Agent header.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source", "title": "Vulnerability summary" }, { "category": "other", "text": "The cups-browsed service is disabled by default on all versions of RHEL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47176" }, { "category": "external", "summary": "RHBZ#2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8", "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-01T18:38:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7463" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source" }, { "cve": "CVE-2024-47850", "discovery_date": "2024-10-04T05:00:52.670668+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316417" } ], "notes": [ { "category": "description", "text": "A flaw was found in cups-browsed. This vulnerability allows an attacker to launch DDoS amplification attacks via an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-47850 is resolved by the same fixes released for the related CVE-2024-47176.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47850" }, { "category": "external", "summary": "RHBZ#2316417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316417" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups", "url": "https://github.com/OpenPrinting/cups" }, { "category": "external", "summary": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat", "url": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat" } ], "release_date": "2024-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-01T18:38:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7463" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.src", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debuginfo-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-debugsource-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-devel-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-0:1.20.0-35.el8_10.x86_64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.aarch64", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.i686", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.ppc64le", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.s390x", "CRB-8.10.0.Z.MAIN.EUS:cups-filters-libs-debuginfo-0:1.20.0-35.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack" } ] }
rhsa-2024_7461
Vulnerability from csaf_redhat
Published
2024-10-01 18:26
Modified
2024-11-24 19:40
Summary
Red Hat Security Advisory: cups-filters security update
Notes
Topic
An update for cups-filters is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently.
Security Fix(es):
* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()
* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)
* cups: libppd: remote command injection via attacker controlled data in PPD file ()
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cups-filters is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. \n\nSecurity Fix(es):\n\n* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()\n\n* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)\n\n* cups: libppd: remote command injection via attacker controlled data in PPD file ()\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:7461", "url": "https://access.redhat.com/errata/RHSA-2024:7461" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7461.json" } ], "title": "Red Hat Security Advisory: cups-filters security update", "tracking": { "current_release_date": "2024-11-24T19:40:54+00:00", "generator": { "date": "2024-11-24T19:40:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:7461", "initial_release_date": "2024-10-01T18:26:01+00:00", "revision_history": [ { "date": "2024-10-01T18:26:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-01T18:26:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T19:40:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-19.el8_2.2.src", "product": { "name": "cups-filters-0:1.20.0-19.el8_2.2.src", "product_id": "cups-filters-0:1.20.0-19.el8_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-19.el8_2.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-19.el8_2.2.x86_64", "product": { "name": "cups-filters-0:1.20.0-19.el8_2.2.x86_64", "product_id": "cups-filters-0:1.20.0-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "product": { "name": "cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "product_id": "cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "product": { "name": "cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "product_id": "cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "product": { "name": "cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "product_id": "cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-19.el8_2.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "product": { "name": "cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "product_id": "cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "product": { "name": "cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "product_id": "cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "product": { "name": "cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "product_id": "cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-19.el8_2.2?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-19.el8_2.2.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src" }, "product_reference": "cups-filters-0:1.20.0-19.el8_2.2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64" }, "product_reference": "cups-filters-0:1.20.0-19.el8_2.2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686" }, "product_reference": "cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686" }, "product_reference": "cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64" }, "product_reference": "cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-23T16:47:10.408000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314253" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenPrinting CUPS. In certain conditions, a remote attacker can add a malicious printer or directly hijack an existing printer by replacing the valid IPP URL with a malicious one. Also, it is possible that due to a lack of validation of IPP attributes returned by the server, this issue allows attacker-controlled data to be used on the rest of the CUPS system.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47076" }, { "category": "external", "summary": "RHBZ#2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/", "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-01T18:26:01+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7461" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes" }, { "cve": "CVE-2024-47175", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2024-09-23T16:57:36.269000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314256" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nThe ppdCreatePPDFromIPP2 function in libppd doesn\u0027t properly check or clean IPP attributes before writing them to a temporary PPD file. This means that a remote attacker, who has control of or has hijacked an exposed printer (through UPD or mDNS), could send a harmful IPP attribute and potentially insert malicious commands into the PPD file.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: libppd: remote command injection via attacker controlled data in PPD file", "title": "Vulnerability summary" }, { "category": "other", "text": "RHCOS and RHEL include libs-cups as a build-time dependency. However, the vulnerability is not exploitable with just the client libraries unless a print server based on OpenPrinting is actively running.\n\nRHEL and RHCOS does not have cups-browsed enabled by default so the impact for those are set to \u0027Low\u0027", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47175" }, { "category": "external", "summary": "RHBZ#2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47175", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6", "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-01T18:26:01+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7461" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups: libppd: remote command injection via attacker controlled data in PPD file" }, { "cve": "CVE-2024-47176", "cwe": { "id": "CWE-940", "name": "Improper Verification of Source of a Communication Channel" }, "discovery_date": "2024-09-23T16:37:23.865000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314252" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nA security issue was discovered in OpenPrinting CUPS. The `cups-browsed` component is responsible for discovering printers on a network and adding them to the system. In order to do so, the service uses two distinct protocols. For the first one, the service binds on all interfaces on UDP port 631 and accepts a custom packet from any untrusted source. This is exploitable from outside the LAN if the computer is exposed on the public internet. The service also listens for DNS-SD / mDNS advertisements trough AVAHI. In both cases, when a printer is discovered by either the UDP packet or mDNS, its IPP or IPPS url is automatically contacted by cups-browsed and a `Get-Printer-Attributes` request is sent to it which can leak potentially sensitive system information to an attacker via the User-Agent header.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source", "title": "Vulnerability summary" }, { "category": "other", "text": "The cups-browsed service is disabled by default on all versions of RHEL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47176" }, { "category": "external", "summary": "RHBZ#2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8", "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-01T18:26:01+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7461" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source" }, { "cve": "CVE-2024-47850", "discovery_date": "2024-10-04T05:00:52.670668+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316417" } ], "notes": [ { "category": "description", "text": "A flaw was found in cups-browsed. This vulnerability allows an attacker to launch DDoS amplification attacks via an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-47850 is resolved by the same fixes released for the related CVE-2024-47176.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47850" }, { "category": "external", "summary": "RHBZ#2316417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316417" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups", "url": "https://github.com/OpenPrinting/cups" }, { "category": "external", "summary": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat", "url": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat" } ], "release_date": "2024-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-01T18:26:01+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7461" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.src", "AppStream-8.2.0.Z.AUS:cups-filters-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-debugsource-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-0:1.20.0-19.el8_2.2.x86_64", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.i686", "AppStream-8.2.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-19.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack" } ] }
rhsa-2024_7462
Vulnerability from csaf_redhat
Published
2024-10-01 18:35
Modified
2024-11-24 19:40
Summary
Red Hat Security Advisory: cups-filters security update
Notes
Topic
An update for cups-filters is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently.
Security Fix(es):
* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()
* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)
* cups: libppd: remote command injection via attacker controlled data in PPD file ()
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cups-filters is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. \n\nSecurity Fix(es):\n\n* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()\n\n* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)\n\n* cups: libppd: remote command injection via attacker controlled data in PPD file ()\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:7462", "url": "https://access.redhat.com/errata/RHSA-2024:7462" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7462.json" } ], "title": "Red Hat Security Advisory: cups-filters security update", "tracking": { "current_release_date": "2024-11-24T19:40:44+00:00", "generator": { "date": "2024-11-24T19:40:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:7462", "initial_release_date": "2024-10-01T18:35:00+00:00", "revision_history": [ { "date": "2024-10-01T18:35:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-01T18:35:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T19:40:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder EUS (v.8.8)", "product": { "name": "Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-29.el8_8.3.src", "product": { "name": "cups-filters-0:1.20.0-29.el8_8.3.src", "product_id": "cups-filters-0:1.20.0-29.el8_8.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-29.el8_8.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-29.el8_8.3.aarch64", "product": { "name": "cups-filters-0:1.20.0-29.el8_8.3.aarch64", "product_id": "cups-filters-0:1.20.0-29.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-29.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "product": { "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "product_id": "cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-29.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "product": { "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "product_id": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-29.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "product": { "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "product_id": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-29.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-29.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "product": { "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "product_id": "cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.20.0-29.el8_8.3?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "product": { "name": "cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "product_id": "cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-29.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "product": { "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "product_id": "cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-29.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "product": { "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "product_id": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-29.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "product": { "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "product_id": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-29.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-29.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "product": { "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "product_id": "cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.20.0-29.el8_8.3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-29.el8_8.3.x86_64", "product": { "name": "cups-filters-0:1.20.0-29.el8_8.3.x86_64", "product_id": "cups-filters-0:1.20.0-29.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-29.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "product": { "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "product_id": "cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-29.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "product": { "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "product_id": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-29.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "product": { "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "product_id": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-29.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-29.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "product": { "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "product_id": "cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.20.0-29.el8_8.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "product": { "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "product_id": "cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-29.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "product": { "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "product_id": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-29.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "product": { "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "product_id": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-29.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-29.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "product": { "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "product_id": "cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.20.0-29.el8_8.3?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-29.el8_8.3.s390x", "product": { "name": "cups-filters-0:1.20.0-29.el8_8.3.s390x", "product_id": "cups-filters-0:1.20.0-29.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-29.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "product": { "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "product_id": "cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-29.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "product": { "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "product_id": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-29.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "product": { "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "product_id": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-29.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-29.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "product": { "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "product_id": "cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.20.0-29.el8_8.3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-29.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64" }, "product_reference": "cups-filters-0:1.20.0-29.el8_8.3.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-29.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le" }, "product_reference": "cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-29.el8_8.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x" }, "product_reference": "cups-filters-0:1.20.0-29.el8_8.3.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-29.el8_8.3.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src" }, "product_reference": "cups-filters-0:1.20.0-29.el8_8.3.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-29.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64" }, "product_reference": "cups-filters-0:1.20.0-29.el8_8.3.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686" }, "product_reference": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le" }, "product_reference": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x" }, "product_reference": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64" }, "product_reference": "cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686" }, "product_reference": "cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le" }, "product_reference": "cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x" }, "product_reference": "cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64" }, "product_reference": "cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64" }, "product_reference": "cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686" }, "product_reference": "cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le" }, "product_reference": "cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x" }, "product_reference": "cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64" }, "product_reference": "cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-29.el8_8.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64" }, "product_reference": "cups-filters-0:1.20.0-29.el8_8.3.aarch64", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-29.el8_8.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le" }, "product_reference": "cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-29.el8_8.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x" }, "product_reference": "cups-filters-0:1.20.0-29.el8_8.3.s390x", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-29.el8_8.3.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src" }, "product_reference": "cups-filters-0:1.20.0-29.el8_8.3.src", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-29.el8_8.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64" }, "product_reference": "cups-filters-0:1.20.0-29.el8_8.3.x86_64", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686" }, "product_reference": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le" }, "product_reference": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x" }, "product_reference": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64" }, "product_reference": "cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686" }, "product_reference": "cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le" }, "product_reference": "cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x" }, "product_reference": "cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64" }, "product_reference": "cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64" }, "product_reference": "cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686" }, "product_reference": "cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le" }, "product_reference": "cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x" }, "product_reference": "cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64" }, "product_reference": "cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-23T16:47:10.408000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314253" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenPrinting CUPS. In certain conditions, a remote attacker can add a malicious printer or directly hijack an existing printer by replacing the valid IPP URL with a malicious one. Also, it is possible that due to a lack of validation of IPP attributes returned by the server, this issue allows attacker-controlled data to be used on the rest of the CUPS system.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47076" }, { "category": "external", "summary": "RHBZ#2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/", "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-01T18:35:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7462" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes" }, { "cve": "CVE-2024-47175", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2024-09-23T16:57:36.269000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314256" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nThe ppdCreatePPDFromIPP2 function in libppd doesn\u0027t properly check or clean IPP attributes before writing them to a temporary PPD file. This means that a remote attacker, who has control of or has hijacked an exposed printer (through UPD or mDNS), could send a harmful IPP attribute and potentially insert malicious commands into the PPD file.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: libppd: remote command injection via attacker controlled data in PPD file", "title": "Vulnerability summary" }, { "category": "other", "text": "RHCOS and RHEL include libs-cups as a build-time dependency. However, the vulnerability is not exploitable with just the client libraries unless a print server based on OpenPrinting is actively running.\n\nRHEL and RHCOS does not have cups-browsed enabled by default so the impact for those are set to \u0027Low\u0027", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47175" }, { "category": "external", "summary": "RHBZ#2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47175", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6", "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-01T18:35:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7462" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups: libppd: remote command injection via attacker controlled data in PPD file" }, { "cve": "CVE-2024-47176", "cwe": { "id": "CWE-940", "name": "Improper Verification of Source of a Communication Channel" }, "discovery_date": "2024-09-23T16:37:23.865000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314252" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nA security issue was discovered in OpenPrinting CUPS. The `cups-browsed` component is responsible for discovering printers on a network and adding them to the system. In order to do so, the service uses two distinct protocols. For the first one, the service binds on all interfaces on UDP port 631 and accepts a custom packet from any untrusted source. This is exploitable from outside the LAN if the computer is exposed on the public internet. The service also listens for DNS-SD / mDNS advertisements trough AVAHI. In both cases, when a printer is discovered by either the UDP packet or mDNS, its IPP or IPPS url is automatically contacted by cups-browsed and a `Get-Printer-Attributes` request is sent to it which can leak potentially sensitive system information to an attacker via the User-Agent header.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source", "title": "Vulnerability summary" }, { "category": "other", "text": "The cups-browsed service is disabled by default on all versions of RHEL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47176" }, { "category": "external", "summary": "RHBZ#2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8", "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-01T18:35:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7462" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source" }, { "cve": "CVE-2024-47850", "discovery_date": "2024-10-04T05:00:52.670668+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316417" } ], "notes": [ { "category": "description", "text": "A flaw was found in cups-browsed. This vulnerability allows an attacker to launch DDoS amplification attacks via an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-47850 is resolved by the same fixes released for the related CVE-2024-47176.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47850" }, { "category": "external", "summary": "RHBZ#2316417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316417" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups", "url": "https://github.com/OpenPrinting/cups" }, { "category": "external", "summary": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat", "url": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat" } ], "release_date": "2024-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-01T18:35:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7462" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "AppStream-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "AppStream-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.src", "CRB-8.8.0.Z.EUS:cups-filters-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debuginfo-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-debugsource-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-devel-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-0:1.20.0-29.el8_8.3.x86_64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.aarch64", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.i686", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.ppc64le", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.s390x", "CRB-8.8.0.Z.EUS:cups-filters-libs-debuginfo-0:1.20.0-29.el8_8.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack" } ] }
rhsa-2024_7504
Vulnerability from csaf_redhat
Published
2024-10-02 11:38
Modified
2024-11-24 19:41
Summary
Red Hat Security Advisory: cups-filters security update
Notes
Topic
An update for cups-filters is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently.
Security Fix(es):
* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()
* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)
* cups: libppd: remote command injection via attacker controlled data in PPD file ()
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cups-filters is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. \n\nSecurity Fix(es):\n\n* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()\n\n* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)\n\n* cups: libppd: remote command injection via attacker controlled data in PPD file ()\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:7504", "url": "https://access.redhat.com/errata/RHSA-2024:7504" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7504.json" } ], "title": "Red Hat Security Advisory: cups-filters security update", "tracking": { "current_release_date": "2024-11-24T19:41:14+00:00", "generator": { "date": "2024-11-24T19:41:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:7504", "initial_release_date": "2024-10-02T11:38:08+00:00", "revision_history": [ { "date": "2024-10-02T11:38:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-02T11:38:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T19:41:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-24.el8_4.2.src", "product": { "name": "cups-filters-0:1.20.0-24.el8_4.2.src", "product_id": "cups-filters-0:1.20.0-24.el8_4.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-24.el8_4.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-24.el8_4.2.x86_64", "product": { "name": "cups-filters-0:1.20.0-24.el8_4.2.x86_64", "product_id": "cups-filters-0:1.20.0-24.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-24.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "product": { "name": "cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "product_id": "cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-24.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "product": { "name": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "product_id": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-24.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "product": { "name": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "product_id": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-24.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-24.el8_4.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "product": { "name": "cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "product_id": "cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-24.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "product": { "name": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "product_id": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-24.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "product": { "name": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "product_id": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-24.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-24.el8_4.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "product": { "name": "cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "product_id": "cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.20.0-24.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "product": { "name": "cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "product_id": "cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.20.0-24.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "product": { "name": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "product_id": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debugsource@1.20.0-24.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "product": { "name": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "product_id": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.20.0-24.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "product": { "name": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "product_id": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs-debuginfo@1.20.0-24.el8_4.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-24.el8_4.2.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src" }, "product_reference": "cups-filters-0:1.20.0-24.el8_4.2.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-24.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64" }, "product_reference": "cups-filters-0:1.20.0-24.el8_4.2.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686" }, "product_reference": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-24.el8_4.2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686" }, "product_reference": "cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64" }, "product_reference": "cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-24.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le" }, "product_reference": "cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-24.el8_4.2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src" }, "product_reference": "cups-filters-0:1.20.0-24.el8_4.2.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-24.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64" }, "product_reference": "cups-filters-0:1.20.0-24.el8_4.2.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686" }, "product_reference": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le" }, "product_reference": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-24.el8_4.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686" }, "product_reference": "cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le" }, "product_reference": "cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64" }, "product_reference": "cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-24.el8_4.2.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src" }, "product_reference": "cups-filters-0:1.20.0-24.el8_4.2.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.20.0-24.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64" }, "product_reference": "cups-filters-0:1.20.0-24.el8_4.2.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686" }, "product_reference": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64" }, "product_reference": "cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-24.el8_4.2.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686" }, "product_reference": "cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64" }, "product_reference": "cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" }, "product_reference": "cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-23T16:47:10.408000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314253" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenPrinting CUPS. In certain conditions, a remote attacker can add a malicious printer or directly hijack an existing printer by replacing the valid IPP URL with a malicious one. Also, it is possible that due to a lack of validation of IPP attributes returned by the server, this issue allows attacker-controlled data to be used on the rest of the CUPS system.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47076" }, { "category": "external", "summary": "RHBZ#2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/", "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T11:38:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7504" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes" }, { "cve": "CVE-2024-47175", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2024-09-23T16:57:36.269000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314256" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nThe ppdCreatePPDFromIPP2 function in libppd doesn\u0027t properly check or clean IPP attributes before writing them to a temporary PPD file. This means that a remote attacker, who has control of or has hijacked an exposed printer (through UPD or mDNS), could send a harmful IPP attribute and potentially insert malicious commands into the PPD file.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: libppd: remote command injection via attacker controlled data in PPD file", "title": "Vulnerability summary" }, { "category": "other", "text": "RHCOS and RHEL include libs-cups as a build-time dependency. However, the vulnerability is not exploitable with just the client libraries unless a print server based on OpenPrinting is actively running.\n\nRHEL and RHCOS does not have cups-browsed enabled by default so the impact for those are set to \u0027Low\u0027", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47175" }, { "category": "external", "summary": "RHBZ#2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47175", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6", "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T11:38:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7504" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups: libppd: remote command injection via attacker controlled data in PPD file" }, { "cve": "CVE-2024-47176", "cwe": { "id": "CWE-940", "name": "Improper Verification of Source of a Communication Channel" }, "discovery_date": "2024-09-23T16:37:23.865000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314252" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nA security issue was discovered in OpenPrinting CUPS. The `cups-browsed` component is responsible for discovering printers on a network and adding them to the system. In order to do so, the service uses two distinct protocols. For the first one, the service binds on all interfaces on UDP port 631 and accepts a custom packet from any untrusted source. This is exploitable from outside the LAN if the computer is exposed on the public internet. The service also listens for DNS-SD / mDNS advertisements trough AVAHI. In both cases, when a printer is discovered by either the UDP packet or mDNS, its IPP or IPPS url is automatically contacted by cups-browsed and a `Get-Printer-Attributes` request is sent to it which can leak potentially sensitive system information to an attacker via the User-Agent header.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source", "title": "Vulnerability summary" }, { "category": "other", "text": "The cups-browsed service is disabled by default on all versions of RHEL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47176" }, { "category": "external", "summary": "RHBZ#2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8", "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T11:38:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7504" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source" }, { "cve": "CVE-2024-47850", "discovery_date": "2024-10-04T05:00:52.670668+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316417" } ], "notes": [ { "category": "description", "text": "A flaw was found in cups-browsed. This vulnerability allows an attacker to launch DDoS amplification attacks via an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-47850 is resolved by the same fixes released for the related CVE-2024-47176.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47850" }, { "category": "external", "summary": "RHBZ#2316417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316417" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups", "url": "https://github.com/OpenPrinting/cups" }, { "category": "external", "summary": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat", "url": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat" } ], "release_date": "2024-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T11:38:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7504" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.AUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.AUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.E4S:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.ppc64le", "AppStream-8.4.0.Z.E4S:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.src", "AppStream-8.4.0.Z.TUS:cups-filters-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debuginfo-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-debugsource-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-0:1.20.0-24.el8_4.2.x86_64", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.i686", "AppStream-8.4.0.Z.TUS:cups-filters-libs-debuginfo-0:1.20.0-24.el8_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack" } ] }
wid-sec-w-2024-2240
Vulnerability from csaf_certbund
Published
2024-09-26 22:00
Modified
2024-11-20 23:00
Summary
CUPS: Mehrere Schwachstellen ermöglichen Ausführung von beliebigem Programmcode
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
CUPS (Common Unix Printing System) ist ein Printspooler, der es lokalen und entfernten Benutzern ermöglicht, Druckfunktionen über das Internet Printing Protocol (IPP) zu nutzen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in CUPS ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuführen und um Informationen offenzulegen.
Betroffene Betriebssysteme
- Linux
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "CUPS (Common Unix Printing System) ist ein Printspooler, der es lokalen und entfernten Benutzern erm\u00f6glicht, Druckfunktionen \u00fcber das Internet Printing Protocol (IPP) zu nutzen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in CUPS ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuf\u00fchren und um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2240 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2240.json" }, { "category": "self", "summary": "WID-SEC-2024-2240 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2240" }, { "category": "external", "summary": "Evil Socket - Attacking UNIX Systems via CUPS vom 2024-09-26", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" }, { "category": "external", "summary": "GitHub Gist - CUPS disclosure vom 2024-09-26", "url": "https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1" }, { "category": "external", "summary": "Red Hat Security Bulletin RHSB-2024-002 vom 2024-09-26", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "GitHub Security Advisory GHSA-rj88-6mr5-rcw8 vom 2024-09-26", "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "category": "external", "summary": "GitHub Security Advisory GHSA-w63j-6g73-wmg5 vom 2024-09-26", "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5" }, { "category": "external", "summary": "GitHub Security Advisory GHSA-7xfx-47qg-grp6 vom 2024-09-26", "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "category": "external", "summary": "GitHub Security Advisory GHSA-p9rh-jxmq-gq47 vom 2024-09-26", "url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47" }, { "category": "external", "summary": "PoC", "url": "https://github.com/RickdeJager/cupshax" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-01127974EC vom 2024-09-26", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-01127974ec" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7045-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7045-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7044-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7044-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7043-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7043-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7042-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7042-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7041-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7041-1" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-CF6AB63871 vom 2024-09-26", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-cf6ab63871" }, { "category": "external", "summary": "Debian Security Advisory DLA-3905 vom 2024-09-29", "url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00048.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3904 vom 2024-09-29", "url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00047.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7346 vom 2024-09-27", "url": "https://access.redhat.com/errata/RHSA-2024:7346" }, { "category": "external", "summary": "Debian Security Advisory DSA-5779 vom 2024-09-29", "url": "https://lists.debian.org/debian-security-announce/2024/msg00192.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5778 vom 2024-09-29", "url": "https://lists.debian.org/debian-security-announce/2024/msg00191.html" }, { "category": "external", "summary": "IBM Security Bulletin 7171730 vom 2024-09-30", "url": "https://www.ibm.com/support/pages/node/7171730" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:7346 vom 2024-09-30", "url": "https://errata.build.resf.org/RLSA-2024:7346" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7346 vom 2024-09-30", "url": "https://linux.oracle.com/errata/ELSA-2024-7346.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7041-2 vom 2024-10-01", "url": "https://ubuntu.com/security/notices/USN-7041-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7461 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7461" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7462 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7462" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7463 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7463" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7043-2 vom 2024-10-01", "url": "https://ubuntu.com/security/notices/USN-7043-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7553 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7553" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7504 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7504" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7503 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7503" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7506 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7506" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7623 vom 2024-10-03", "url": "https://access.redhat.com/errata/RHSA-2024:7623" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7463 vom 2024-10-02", "url": "http://linux.oracle.com/errata/ELSA-2024-7463.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7551 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7551" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3523-1 vom 2024-10-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/53P3ZI4CMCGA6USMZJILJTM3YJC3QERY/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7041-3 vom 2024-10-07", "url": "https://ubuntu.com/security/notices/USN-7041-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7043-3 vom 2024-10-07", "url": "https://ubuntu.com/security/notices/USN-7043-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7043-4 vom 2024-10-09", "url": "https://ubuntu.com/security/notices/USN-7042-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7043-4 vom 2024-10-09", "url": "https://ubuntu.com/security/notices/USN-7043-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3570-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019581.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3711-1 vom 2024-10-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019654.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7042-3 vom 2024-10-21", "url": "https://ubuntu.com/security/notices/USN-7042-3" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:7463 vom 2024-10-25", "url": "https://errata.build.resf.org/RLSA-2024:7463" }, { "category": "external", "summary": "IGEL Security Notice ISN-2024-19 vom 2024-10-31", "url": "https://kb.igel.com/security-safety/current/isn-2024-19-cups-vulnerabilities" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2656 vom 2024-11-01", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2656.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3863-1 vom 2024-11-01", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JUIJY4Q67AEFHXIYBPNGXZAXSLJ6JFKF/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9470 vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9470" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7553 vom 2024-11-14", "url": "https://linux.oracle.com/errata/ELSA-2024-7553.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-9470 vom 2024-11-21", "url": "https://linux.oracle.com/errata/ELSA-2024-9470.html" } ], "source_lang": "en-US", "title": "CUPS: Mehrere Schwachstellen erm\u00f6glichen Ausf\u00fchrung von beliebigem Programmcode", "tracking": { "current_release_date": "2024-11-20T23:00:00.000+00:00", "generator": { "date": "2024-11-21T13:08:03.333+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-2240", "initial_release_date": "2024-09-26T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-26T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian und Red Hat aufgenommen" }, { "date": "2024-09-30T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM, Rocky Enterprise Software Foundation und Oracle Linux aufgenommen" }, { "date": "2024-10-01T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2024-10-06T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-21T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-27T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von IGEL und Amazon aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "15" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "Certified Container", "product": { "name": "IBM App Connect Enterprise Certified Container", "product_id": "T037907", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:certified_container" } } } ], "category": "product_name", "name": "App Connect Enterprise" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11", "product": { "name": "IGEL OS 11", "product_id": "T030282", "product_identification_helper": { "cpe": "cpe:/o:igel:os:11" } } }, { "category": "product_version", "name": "12", "product": { "name": "IGEL OS 12", "product_id": "T030283", "product_identification_helper": { "cpe": "cpe:/o:igel:os:12" } } } ], "category": "product_name", "name": "OS" } ], "category": "vendor", "name": "IGEL" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=2.0.1", "product": { "name": "Open Source CUPS \u003c=2.0.1", "product_id": "825896" } }, { "category": "product_version_range", "name": "\u003c=2.0.1", "product": { "name": "Open Source CUPS \u003c=2.0.1", "product_id": "825896-fixed" } } ], "category": "product_name", "name": "CUPS" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47076", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in mehreren Komponenten des CUPS-Drucksystems. Wenn \"cups-browsed\" einen Drucker entdeckt (\u00fcber UDP-Port 631 oder DNS-Diensterkennung/mDNS), stellt es eine Verbindung zum IPP-Server her, der in der Anzeige angegeben ist, und ruft dessen Eigenschaften ab. In dieser Anfrage wird die verwendete Kernel-Version von \"cups-browsed\" gegen\u00fcber dem IPP-Server offengelegt. Diese Information kann f\u00fcr einen Angreifer in nachgelagerten Angriffen n\u00fctzlich sein. Das IPP-Attribut \"printer-privacy-policy-uri\" wird in \"libcupsfilters\", \"libppd\" und \"cups-filters\" nicht ordnungsgem\u00e4\u00df bez\u00fcglich sch\u00e4dlicher Befehle im Parameter \"FoomaticRIPCommandLine\" bereinigt. Ein von einem Angreifer kontrollierter IPP-Server kann dies ausnutzen, um in seiner Antwort beliebige URIs und Shell-Befehle zur\u00fcckzugeben, wodurch das betroffene System diese URL l\u00e4dt und den Befehl ausf\u00fchrt, sobald ein Druckauftrag gestartet wird. Ein anonymer Angreifer kann diese Schwachstellen in Kombination ausnutzen, um beliebigen Code auf dem Zielhost als \"lp\"-Benutzer auszuf\u00fchren und um Informationen offenzulegen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T030282", "T004914", "T037907", "T030283", "T032255", "74185" ], "last_affected": [ "825896" ] }, "release_date": "2024-09-26T22:00:00.000+00:00", "title": "CVE-2024-47076" }, { "cve": "CVE-2024-47175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in mehreren Komponenten des CUPS-Drucksystems. Wenn \"cups-browsed\" einen Drucker entdeckt (\u00fcber UDP-Port 631 oder DNS-Diensterkennung/mDNS), stellt es eine Verbindung zum IPP-Server her, der in der Anzeige angegeben ist, und ruft dessen Eigenschaften ab. In dieser Anfrage wird die verwendete Kernel-Version von \"cups-browsed\" gegen\u00fcber dem IPP-Server offengelegt. Diese Information kann f\u00fcr einen Angreifer in nachgelagerten Angriffen n\u00fctzlich sein. Das IPP-Attribut \"printer-privacy-policy-uri\" wird in \"libcupsfilters\", \"libppd\" und \"cups-filters\" nicht ordnungsgem\u00e4\u00df bez\u00fcglich sch\u00e4dlicher Befehle im Parameter \"FoomaticRIPCommandLine\" bereinigt. Ein von einem Angreifer kontrollierter IPP-Server kann dies ausnutzen, um in seiner Antwort beliebige URIs und Shell-Befehle zur\u00fcckzugeben, wodurch das betroffene System diese URL l\u00e4dt und den Befehl ausf\u00fchrt, sobald ein Druckauftrag gestartet wird. Ein anonymer Angreifer kann diese Schwachstellen in Kombination ausnutzen, um beliebigen Code auf dem Zielhost als \"lp\"-Benutzer auszuf\u00fchren und um Informationen offenzulegen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T030282", "T004914", "T037907", "T030283", "T032255", "74185" ], "last_affected": [ "825896" ] }, "release_date": "2024-09-26T22:00:00.000+00:00", "title": "CVE-2024-47175" }, { "cve": "CVE-2024-47176", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in mehreren Komponenten des CUPS-Drucksystems. Wenn \"cups-browsed\" einen Drucker entdeckt (\u00fcber UDP-Port 631 oder DNS-Diensterkennung/mDNS), stellt es eine Verbindung zum IPP-Server her, der in der Anzeige angegeben ist, und ruft dessen Eigenschaften ab. In dieser Anfrage wird die verwendete Kernel-Version von \"cups-browsed\" gegen\u00fcber dem IPP-Server offengelegt. Diese Information kann f\u00fcr einen Angreifer in nachgelagerten Angriffen n\u00fctzlich sein. Das IPP-Attribut \"printer-privacy-policy-uri\" wird in \"libcupsfilters\", \"libppd\" und \"cups-filters\" nicht ordnungsgem\u00e4\u00df bez\u00fcglich sch\u00e4dlicher Befehle im Parameter \"FoomaticRIPCommandLine\" bereinigt. Ein von einem Angreifer kontrollierter IPP-Server kann dies ausnutzen, um in seiner Antwort beliebige URIs und Shell-Befehle zur\u00fcckzugeben, wodurch das betroffene System diese URL l\u00e4dt und den Befehl ausf\u00fchrt, sobald ein Druckauftrag gestartet wird. Ein anonymer Angreifer kann diese Schwachstellen in Kombination ausnutzen, um beliebigen Code auf dem Zielhost als \"lp\"-Benutzer auszuf\u00fchren und um Informationen offenzulegen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T030282", "T004914", "T037907", "T030283", "T032255", "74185" ], "last_affected": [ "825896" ] }, "release_date": "2024-09-26T22:00:00.000+00:00", "title": "CVE-2024-47176" }, { "cve": "CVE-2024-47177", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in mehreren Komponenten des CUPS-Drucksystems. Wenn \"cups-browsed\" einen Drucker entdeckt (\u00fcber UDP-Port 631 oder DNS-Diensterkennung/mDNS), stellt es eine Verbindung zum IPP-Server her, der in der Anzeige angegeben ist, und ruft dessen Eigenschaften ab. In dieser Anfrage wird die verwendete Kernel-Version von \"cups-browsed\" gegen\u00fcber dem IPP-Server offengelegt. Diese Information kann f\u00fcr einen Angreifer in nachgelagerten Angriffen n\u00fctzlich sein. Das IPP-Attribut \"printer-privacy-policy-uri\" wird in \"libcupsfilters\", \"libppd\" und \"cups-filters\" nicht ordnungsgem\u00e4\u00df bez\u00fcglich sch\u00e4dlicher Befehle im Parameter \"FoomaticRIPCommandLine\" bereinigt. Ein von einem Angreifer kontrollierter IPP-Server kann dies ausnutzen, um in seiner Antwort beliebige URIs und Shell-Befehle zur\u00fcckzugeben, wodurch das betroffene System diese URL l\u00e4dt und den Befehl ausf\u00fchrt, sobald ein Druckauftrag gestartet wird. Ein anonymer Angreifer kann diese Schwachstellen in Kombination ausnutzen, um beliebigen Code auf dem Zielhost als \"lp\"-Benutzer auszuf\u00fchren und um Informationen offenzulegen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "398363", "T030282", "T004914", "T037907", "T030283", "T032255", "74185" ], "last_affected": [ "825896" ] }, "release_date": "2024-09-26T22:00:00.000+00:00", "title": "CVE-2024-47177" } ] }
ncsc-2024-0384
Vulnerability from csaf_ncscnl
Published
2024-09-27 08:45
Modified
2024-10-02 08:45
Summary
Kwetsbaarheden ontdekt in CUPS
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Onlangs zijn er door een onderzoeker een aantal kwetsbaarheden ontdekt in CUPS die kunnen leiden tot Remote Code Execution. Deze zijn bekend gemaakt als "9.9 RCE affecting all GNU/Unix systems".
Interpretaties
Door een aaneenschakeling van de vier kwetsbaarheden, kan een kwaadwillende onder bepaalde omstandigheden willekeurige code uitvoeren binnen de context van de CUPS-service.
Oplossingen
Er zijn op dit moment nog geen patches beschikbaar om de kwetsbaarheden te verhelpen in CUPS versies lager dan 2.0.1.
Tot het moment dat de updates beschikbaar komen is het handelingsperspectief om de cups-browse daemon uit te schakelen.
Tevens is het raadzaam om te controleren of CUPS onbereikbaar is vanaf publieke netwerken. Controleer of verkeer van en naar UDP poort 631 wordt geblokkeerd. Hiermee wordt het risico van misbruik vanaf publieke netwerken verminderd.
**UPDATE**
Er zijn patches beschikbaar gesteld om de kwetsbaarheden te verhelpen. Deze zijn doorgevoerd in de distributies van GNU/Linux systemen.
Kans
medium
Schade
high
CWE-1327
Binding to an Unrestricted IP Address
CWE-940
Improper Verification of Source of a Communication Channel
CWE-749
Exposed Dangerous Method or Function
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-20
Improper Input Validation
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Onlangs zijn er door een onderzoeker een aantal kwetsbaarheden ontdekt in CUPS die kunnen leiden tot Remote Code Execution. Deze zijn bekend gemaakt als \"9.9 RCE affecting all GNU/Unix systems\".", "title": "Feiten" }, { "category": "description", "text": "Door een aaneenschakeling van de vier kwetsbaarheden, kan een kwaadwillende onder bepaalde omstandigheden willekeurige code uitvoeren binnen de context van de CUPS-service.", "title": "Interpretaties" }, { "category": "description", "text": "Er zijn op dit moment nog geen patches beschikbaar om de kwetsbaarheden te verhelpen in CUPS versies lager dan 2.0.1.\n\nTot het moment dat de updates beschikbaar komen is het handelingsperspectief om de cups-browse daemon uit te schakelen.\n\nTevens is het raadzaam om te controleren of CUPS onbereikbaar is vanaf publieke netwerken. Controleer of verkeer van en naar UDP poort 631 wordt geblokkeerd. Hiermee wordt het risico van misbruik vanaf publieke netwerken verminderd.\n\n**UPDATE**\nEr zijn patches beschikbaar gesteld om de kwetsbaarheden te verhelpen. Deze zijn doorgevoerd in de distributies van GNU/Linux systemen.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Binding to an Unrestricted IP Address", "title": "CWE-1327" }, { "category": "general", "text": "Improper Verification of Source of a Communication Channel", "title": "CWE-940" }, { "category": "general", "text": "Exposed Dangerous Method or Function", "title": "CWE-749" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - redhat", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076" }, { "category": "external", "summary": "Reference - redhat", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175" }, { "category": "external", "summary": "Reference - redhat", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176" }, { "category": "external", "summary": "Reference - redhat", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47177" } ], "title": "Kwetsbaarheden ontdekt in CUPS", "tracking": { "current_release_date": "2024-10-02T08:45:09.718543Z", "id": "NCSC-2024-0384", "initial_release_date": "2024-09-27T08:45:53.798141Z", "revision_history": [ { "date": "2024-09-27T08:45:53.798141Z", "number": "0", "summary": "Initiele versie" }, { "date": "2024-10-02T08:45:09.718543Z", "number": "1", "summary": "New revision" } ], "status": "final", "version": "1.0.1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "cups-browsed", "product": { "name": "cups-browsed", "product_id": "CSAFPID-1656667", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:cups-browsed:2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cups-browsed", "product": { "name": "cups-browsed", "product_id": "CSAFPID-1656629", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:cups-browsed:__2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cups-filters", "product": { "name": "cups-filters", "product_id": "CSAFPID-1656665", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:cups-filters:2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cups-filters", "product": { "name": "cups-filters", "product_id": "CSAFPID-1657010", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:cups-filters:2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cups-filters", "product": { "name": "cups-filters", "product_id": "CSAFPID-1656651", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:cups-filters:___2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "libcupsfilters", "product": { "name": "libcupsfilters", "product_id": "CSAFPID-1656666", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:libcupsfilters:2.1b1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "libcupsfilters", "product": { "name": "libcupsfilters", "product_id": "CSAFPID-1656627", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:libcupsfilters:___2.1b1:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "openprinting" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47175", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" } ], "references": [ { "category": "self", "summary": "CVE-2024-47175", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47175.json" } ], "title": "CVE-2024-47175" }, { "cve": "CVE-2024-47176", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Exposed Dangerous Method or Function", "title": "CWE-749" }, { "category": "other", "text": "Binding to an Unrestricted IP Address", "title": "CWE-1327" }, { "category": "other", "text": "Improper Verification of Source of a Communication Channel", "title": "CWE-940" } ], "product_status": { "known_affected": [ "CSAFPID-1656629" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47176", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47176.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1656629" ] } ], "title": "CVE-2024-47176" }, { "cve": "CVE-2024-47177", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-1656651" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47177", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47177.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1656651" ] } ], "title": "CVE-2024-47177" }, { "cve": "CVE-2024-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1656627" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47076", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47076.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1656627" ] } ], "title": "CVE-2024-47076" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.