-
Story
-
Resolution: Unresolved
-
Undefined
-
None
-
None
-
cups-filters-1.28.7-24.el9
-
Moderate
-
1
-
rhel-stacks-web-servers
-
ssg_core_services
-
15
-
0
-
False
-
False
-
-
Yes
-
_WS-Refined_
-
Requested
-
None
-
Feature
-
-
Proposed
-
Unspecified
-
Unspecified
-
Unspecified
-
None
CVE-2024-47177 shows possible exploit in foomatic-rip filter if other vulnerability is exploited to get control over installed drivers or driver generators, which would give an attacker a way how to taint a PPD file with problematic values for FoomaticRIPCommandLine* keywords, which are later run as command during file processing in printing process.
To prevent this issue, foomatic-rip filter will reject all values by default unless the value is allowed by adding the value's hash into a specific file, which foomatic-rip will read when running.
Acceptance criteria:
- foomatic-rip filter rejects any FoomaticRIPCommandLine* values in default configuration,
- foomatic-rip reads allowed values from files at /usr/share/foomatic/hashes.d and /etc/foomatic/hashes.d,
- foomatic-hash tool scans presented PPD file (or location - RHEL 10 only) and finds values of FoomaticRIPCommandLine* keywords and save them into file for review and hashes contents of input file line by line by using the hash SHA-256.