An update for cups-filters is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2023-1315 Final 1.0 1.0 2023-06-03 Initial 2023-06-03 2023-06-03 openEuler SA Tool V1.0 2023-06-03 cups-filters security update An update for cups-filters is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1. This project provides backends, filters, and other software that was once part of the core CUPS distribution but is no longer maintained by Apple Inc. In addition it contains additional filters and software developed independently of Apple, especially filters for the PDF-centric printing workflow introduced by OpenPrinting and a daemon to browse Bonjour broadcasts of remote CUPS printers to make these printers available locally and to provide backward compatibility to the old CUPS broadcasting and browsing of CUPS 1.5.x and older. Security Fix(es): cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime.(CVE-2023-24805) An update for cups-filters is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High cups-filters https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1315 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-24805 https://nvd.nist.gov/vuln/detail/CVE-2023-24805 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 cups-filters-devel-1.26.1-4.oe1.aarch64.rpm cups-filters-debugsource-1.26.1-4.oe1.aarch64.rpm cups-filters-1.26.1-4.oe1.aarch64.rpm cups-filters-debuginfo-1.26.1-4.oe1.aarch64.rpm cups-filters-debugsource-1.26.1-4.oe1.aarch64.rpm cups-filters-debuginfo-1.26.1-4.oe1.aarch64.rpm cups-filters-devel-1.26.1-4.oe1.aarch64.rpm cups-filters-1.26.1-4.oe1.aarch64.rpm cups-filters-1.28.9-3.oe2203.aarch64.rpm cups-filters-debuginfo-1.28.9-3.oe2203.aarch64.rpm cups-filters-debugsource-1.28.9-3.oe2203.aarch64.rpm cups-filters-devel-1.28.9-3.oe2203.aarch64.rpm cups-filters-devel-1.28.9-3.oe2203sp1.aarch64.rpm cups-filters-debugsource-1.28.9-3.oe2203sp1.aarch64.rpm cups-filters-debuginfo-1.28.9-3.oe2203sp1.aarch64.rpm cups-filters-1.28.9-3.oe2203sp1.aarch64.rpm cups-filters-help-1.26.1-4.oe1.noarch.rpm cups-filters-help-1.26.1-4.oe1.noarch.rpm cups-filters-help-1.28.9-3.oe2203.noarch.rpm cups-filters-help-1.28.9-3.oe2203sp1.noarch.rpm cups-filters-1.26.1-4.oe1.src.rpm cups-filters-1.26.1-4.oe1.src.rpm cups-filters-1.28.9-3.oe2203.src.rpm cups-filters-1.28.9-3.oe2203sp1.src.rpm cups-filters-1.26.1-4.oe1.x86_64.rpm cups-filters-devel-1.26.1-4.oe1.x86_64.rpm cups-filters-debugsource-1.26.1-4.oe1.x86_64.rpm cups-filters-debuginfo-1.26.1-4.oe1.x86_64.rpm cups-filters-1.26.1-4.oe1.x86_64.rpm cups-filters-debuginfo-1.26.1-4.oe1.x86_64.rpm cups-filters-debugsource-1.26.1-4.oe1.x86_64.rpm cups-filters-devel-1.26.1-4.oe1.x86_64.rpm cups-filters-debuginfo-1.28.9-3.oe2203.x86_64.rpm cups-filters-debugsource-1.28.9-3.oe2203.x86_64.rpm cups-filters-devel-1.28.9-3.oe2203.x86_64.rpm cups-filters-1.28.9-3.oe2203.x86_64.rpm cups-filters-1.28.9-3.oe2203sp1.x86_64.rpm cups-filters-debugsource-1.28.9-3.oe2203sp1.x86_64.rpm cups-filters-devel-1.28.9-3.oe2203sp1.x86_64.rpm cups-filters-debuginfo-1.28.9-3.oe2203sp1.x86_64.rpm cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime. 2023-06-03 CVE-2023-24805 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 High 8.8 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cups-filters security update 2023-06-03 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1315