cups-2.2.6-60.el8_10
エラータID: AXSA:2024-8519:05
リリース日:
2024/07/05 Friday - 10:38
題名:
cups-2.2.6-60.el8_10
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- CUPS の cupsd には、Listen 設定値にシンボリックリンク
が設定されている状態で cupsd を起動した際、指定した引数
で chmod コマンドを実行し、意図しないアクセス権限を付与
してしまう問題があるため、ローカルの攻撃者により、不正
なファイルの書き込み、および情報の漏洩を可能とする脆弱性
が存在します。(CVE-2024-35235)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-35235
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.8 and earlier, when starting the cupsd server with a Listen configuration item pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Given that cupsd is often running as root, this can result in the change of permission of any user or system files to be world writable. Given the aforementioned Ubuntu AppArmor context, on such systems this vulnerability is limited to those files modifiable by the cupsd process. In that specific case it was found to be possible to turn the configuration of the Listen argument into full control over the cupsd.conf and cups-files.conf configuration files. By later setting the User and Group arguments in cups-files.conf, and printing with a printer configured by PPD with a `FoomaticRIPCommandLine` argument, arbitrary user and group (not root) command execution could be achieved, which can further be used on Ubuntu systems to achieve full root command execution. Commit ff1f8a623e090dee8a8aadf12a6a4b25efac143d contains a patch for the issue.
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.8 and earlier, when starting the cupsd server with a Listen configuration item pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Given that cupsd is often running as root, this can result in the change of permission of any user or system files to be world writable. Given the aforementioned Ubuntu AppArmor context, on such systems this vulnerability is limited to those files modifiable by the cupsd process. In that specific case it was found to be possible to turn the configuration of the Listen argument into full control over the cupsd.conf and cups-files.conf configuration files. By later setting the User and Group arguments in cups-files.conf, and printing with a printer configured by PPD with a `FoomaticRIPCommandLine` argument, arbitrary user and group (not root) command execution could be achieved, which can further be used on Ubuntu systems to achieve full root command execution. Commit ff1f8a623e090dee8a8aadf12a6a4b25efac143d contains a patch for the issue.
追加情報:
N/A
ダウンロード:
SRPMS
- cups-2.2.6-60.el8_10.src.rpm
MD5: 443ae8d7b738e943b83b2df5a969df15
SHA-256: 0493ba8a0348317759f3c27db54e8a3f21ea750e09cce422e5f4491e86640d61
Size: 10.10 MB
Asianux Server 8 for x86_64
- cups-2.2.6-60.el8_10.x86_64.rpm
MD5: d62e289a2327f5d403b627cdb8fb42d4
SHA-256: 992d23dda134b954155d91b82a996a9711491f136bc0db8cf1844570a7b5d852
Size: 1.43 MB - cups-client-2.2.6-60.el8_10.x86_64.rpm
MD5: e36c53ea1fb74a0713cb8b758f2afb18
SHA-256: ad31e22d70c70e7714e3f490f3579aaa22a39a64ebc86fa90697e4a0cd9bf700
Size: 171.88 kB - cups-devel-2.2.6-60.el8_10.i686.rpm
MD5: 5888dc1205a314b29eb572e195afcf90
SHA-256: 59bc4a03f7b038cda4a349d20414ba3ea21cb527d14b449334088e2dd16aee46
Size: 151.47 kB - cups-devel-2.2.6-60.el8_10.x86_64.rpm
MD5: b005a38cd458c395ec70f705be57550c
SHA-256: 19cc5105e04320b04f85e50a0993e79efff26ace86c562f3f1923f190d091a8c
Size: 151.48 kB - cups-filesystem-2.2.6-60.el8_10.noarch.rpm
MD5: eebb5a4567842c5f133495d5b2c914d7
SHA-256: 4dbc3d4bcc1b9f786bff450fb898e6f860d61645aae059cba441b879a0837d06
Size: 111.81 kB - cups-ipptool-2.2.6-60.el8_10.x86_64.rpm
MD5: 90f018c1126d63aa5ea4fee9b9337f0d
SHA-256: ee23b968ad0bf82ba5d149ebaa1894fc5c310b40b2df1c77bf19b8609b57118e
Size: 5.82 MB - cups-libs-2.2.6-60.el8_10.i686.rpm
MD5: 42360e0b6d89b64ea87d575ff051acca
SHA-256: 567cb68d212583f72afafa43258fe91e4d930d19d0dc1c027b72bdab0282bf0d
Size: 462.36 kB - cups-libs-2.2.6-60.el8_10.x86_64.rpm
MD5: 558bae32425b8da120d8c9af8cb8d96f
SHA-256: 99f565bee84ce1a9b5746dc7ccaafc7b64c78b9ed4041950518f6b1c2a482802
Size: 435.59 kB - cups-lpd-2.2.6-60.el8_10.x86_64.rpm
MD5: f79273f5ad596238af38780c9eb91ae0
SHA-256: de6a5ce9265176507420277829e60c89945d94036e93c45951178053bf141973
Size: 127.04 kB