cvrf2cusa/cvrf/2023/cvrf-openEuler-SA-2023-1315.xml
Jia Chao 0b34274085 git mv
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-25 09:57:37 +08:00

143 lines
14 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for cups-filters is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2023-1315</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2023-06-03</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2023-06-03</InitialReleaseDate>
<CurrentReleaseDate>2023-06-03</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2023-06-03</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">cups-filters security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for cups-filters is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">This project provides backends, filters, and other software that was once part of the core CUPS distribution but is no longer maintained by Apple Inc. In addition it contains additional filters and software developed independently of Apple, especially filters for the PDF-centric printing workflow introduced by OpenPrinting and a daemon to browse Bonjour broadcasts of remote CUPS printers to make these printers available locally and to provide backward compatibility to the old CUPS broadcasting and browsing of CUPS 1.5.x and older.
Security Fix(es):
cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) &gt;&gt; 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime.(CVE-2023-24805)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for cups-filters is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">cups-filters</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1315</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-24805</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2023-24805</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
<FullProductName ProductID="openEuler-20.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">openEuler-20.03-LTS-SP3</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">openEuler-22.03-LTS</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">openEuler-22.03-LTS-SP1</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="cups-filters-devel-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">cups-filters-devel-1.26.1-4.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debugsource-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">cups-filters-debugsource-1.26.1-4.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">cups-filters-1.26.1-4.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debuginfo-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">cups-filters-debuginfo-1.26.1-4.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debugsource-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">cups-filters-debugsource-1.26.1-4.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debuginfo-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">cups-filters-debuginfo-1.26.1-4.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-devel-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">cups-filters-devel-1.26.1-4.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">cups-filters-1.26.1-4.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">cups-filters-1.28.9-3.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debuginfo-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">cups-filters-debuginfo-1.28.9-3.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debugsource-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">cups-filters-debugsource-1.28.9-3.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-devel-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">cups-filters-devel-1.28.9-3.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-devel-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">cups-filters-devel-1.28.9-3.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debugsource-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">cups-filters-debugsource-1.28.9-3.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debuginfo-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">cups-filters-debuginfo-1.28.9-3.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">cups-filters-1.28.9-3.oe2203sp1.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="noarch">
<FullProductName ProductID="cups-filters-help-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">cups-filters-help-1.26.1-4.oe1.noarch.rpm</FullProductName>
<FullProductName ProductID="cups-filters-help-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">cups-filters-help-1.26.1-4.oe1.noarch.rpm</FullProductName>
<FullProductName ProductID="cups-filters-help-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">cups-filters-help-1.28.9-3.oe2203.noarch.rpm</FullProductName>
<FullProductName ProductID="cups-filters-help-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">cups-filters-help-1.28.9-3.oe2203sp1.noarch.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="cups-filters-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">cups-filters-1.26.1-4.oe1.src.rpm</FullProductName>
<FullProductName ProductID="cups-filters-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">cups-filters-1.26.1-4.oe1.src.rpm</FullProductName>
<FullProductName ProductID="cups-filters-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">cups-filters-1.28.9-3.oe2203.src.rpm</FullProductName>
<FullProductName ProductID="cups-filters-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">cups-filters-1.28.9-3.oe2203sp1.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="cups-filters-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">cups-filters-1.26.1-4.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-devel-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">cups-filters-devel-1.26.1-4.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debugsource-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">cups-filters-debugsource-1.26.1-4.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debuginfo-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">cups-filters-debuginfo-1.26.1-4.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">cups-filters-1.26.1-4.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debuginfo-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">cups-filters-debuginfo-1.26.1-4.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debugsource-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">cups-filters-debugsource-1.26.1-4.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-devel-1.26.1-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">cups-filters-devel-1.26.1-4.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debuginfo-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">cups-filters-debuginfo-1.28.9-3.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debugsource-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">cups-filters-debugsource-1.28.9-3.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-devel-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">cups-filters-devel-1.28.9-3.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">cups-filters-1.28.9-3.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">cups-filters-1.28.9-3.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debugsource-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">cups-filters-debugsource-1.28.9-3.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-devel-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">cups-filters-devel-1.28.9-3.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="cups-filters-debuginfo-1.28.9-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">cups-filters-debuginfo-1.28.9-3.oe2203sp1.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) &gt;&gt; 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime.</Note>
</Notes>
<ReleaseDate>2023-06-03</ReleaseDate>
<CVE>CVE-2023-24805</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
<ProductID>openEuler-22.03-LTS-SP1</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>8.8</BaseScore>
<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>cups-filters security update</Description>
<DATE>2023-06-03</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1315</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>