Your message dated Sat, 22 Jun 2024 10:32:36 +0000
with message-id <e1sky2u-004yzx...@fasolo.debian.org>
and subject line Bug#1073002: fixed in cups 2.3.3op2-3+deb11u7
has caused the Debian Bug report #1073002,
regarding cups: CVE-2024-35235
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1073002: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073002
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: cups
Version: 2.4.7-1.2
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for cups.

CVE-2024-35235[0]:
| OpenPrinting CUPS is an open source printing system for Linux and
| other Unix-like operating systems. In versions 2.4.8 and earlier,
| when starting the cupsd server with a Listen configuration item
| pointing to a symbolic link, the cupsd process can be caused to
| perform an arbitrary chmod of the provided argument, providing
| world-writable access to the target. Given that cupsd is often
| running as root, this can result in the change of permission of any
| user or system files to be world writable. Given the aforementioned
| Ubuntu AppArmor context, on such systems this vulnerability is
| limited to those files modifiable by the cupsd process. In that
| specific case it was found to be possible to turn the configuration
| of the Listen argument into full control over the cupsd.conf and
| cups-files.conf configuration files. By later setting the User and
| Group arguments in cups-files.conf, and printing with a printer
| configured by PPD with a `FoomaticRIPCommandLine` argument,
| arbitrary user and group (not root) command execution could be
| achieved, which can further be used on Ubuntu systems to achieve
| full root command execution. Commit
| ff1f8a623e090dee8a8aadf12a6a4b25efac143d contains a patch for the
| issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-35235
    https://www.cve.org/CVERecord?id=CVE-2024-35235
[1] https://www.openwall.com/lists/oss-security/2024/06/11/1
[2] 
https://github.com/OpenPrinting/cups/commit/a436956f374b0fd7f5da9df482e4f5840fa1c0d2

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: cups
Source-Version: 2.3.3op2-3+deb11u7
Done: Thorsten Alteholz <deb...@alteholz.de>

We believe that the bug you reported is fixed in the latest version of
cups, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1073...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thorsten Alteholz <deb...@alteholz.de> (supplier of updated cups package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 11 Jun 2024 22:16:49 +0200
Source: cups
Architecture: source
Version: 2.3.3op2-3+deb11u7
Distribution: bullseye
Urgency: medium
Maintainer: Debian Printing Team <debian-print...@lists.debian.org>
Changed-By: Thorsten Alteholz <deb...@alteholz.de>
Closes: 1073002
Changes:
 cups (2.3.3op2-3+deb11u7) bullseye; urgency=medium
 .
   * CVE-2024-35235 (Closes: #1073002)
     fix domain socket handling
Checksums-Sha1:
 6fad001d754fdd5e4ca0808cadbba70c0029867a 3412 cups_2.3.3op2-3+deb11u7.dsc
 1eb9eb76b339295dd9a41be4c4eace1815d00d9a 349260 
cups_2.3.3op2-3+deb11u7.debian.tar.xz
 1274e1cef5dabd86fbde2375b7671c9d14cd0fcf 14381 
cups_2.3.3op2-3+deb11u7_amd64.buildinfo
Checksums-Sha256:
 b9b7cc43dc97fdbcac5bcaca64e6c4f8d03598f9ee8c18b454df20934835dcb1 3412 
cups_2.3.3op2-3+deb11u7.dsc
 f2a567cc44717ac4989030e06682d4ae1760660704486f73887c3e87e4ffe4e7 349260 
cups_2.3.3op2-3+deb11u7.debian.tar.xz
 a4a1692a3a39c03a6ceeba3cceea01cdc0d516002cc0edd33b512af6a1f97225 14381 
cups_2.3.3op2-3+deb11u7_amd64.buildinfo
Files:
 4d86b9db03d0d75be74e24e5e9c951bb 3412 net optional cups_2.3.3op2-3+deb11u7.dsc
 479ef7c3926477e01f2d82eae2ca38cd 349260 net optional 
cups_2.3.3op2-3+deb11u7.debian.tar.xz
 32ed5e0b37dfeec985059534fa057ff0 14381 net optional 
cups_2.3.3op2-3+deb11u7_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQKnBAEBCgCRFiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAmZ18CdfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy
MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcTHGRlYmlhbkBh
bHRlaG9sei5kZQAKCRCW/KwNOHtYR86LEACbDCeVG4vieIPdCQNcDpj3iA4QGX+g
uR2we9kbojgwKSCBlMuJ8QW6oe5Z/ccTSMmityv+YPi2/DCJkCWFdR0B7keadodl
g72JpvOKDzWnj7caA2Y1iQr20kZavpOpvaJaezs+lprTAk6Jr18rxBNYjTilEXGh
wXLnOyaGdx3ha0We2PApOKP1YWhQF1wm61xm74kMopmiMXeGGXYsOD2ZUNr+rlv4
6O5vaR3EXJJyBDjkcQLynGOTrB4yH3fJXHOSnjW123JBKjj8ZuLGblYpALO6nTtB
Gum3zWRzENMR07iEtz12qS3HV77esNR+JkRWp+TAZOqsIqBVmIon7zm2X6RWHjza
bnMHB1N5DVfSzcSJNePUpAldikEa6BkmOORFONhGUl6D9TjxdvQGDgA1Avk94r67
N3jETGVK+fWfS2m4UpZzQ019X7K6A4Huc4q2KzeFkzUFAtLTFzm4dwdSPoQPirFt
uqnOajSagt6pebRUcy3Nn+7T8zby5VznwFmi0xkuLp+Sw9lmuUpHtIvdYyiXA8pQ
2mba3T0xbs1uqgZmtBZRz+LMFoMyKAVg1xQ7CIgMCdeGvD2NeAuBzMdTvp1vprDy
Y8vcoTTeHiT7awJxzMknR1GmnPWYOhyAfFIqoPcXIkrzY5w3dTCFD9PqK+4NwrHf
zbDqP7eGyzBmrA==
=oq/l
-----END PGP SIGNATURE-----

Attachment: pgp8ePT8qOCgZ.pgp
Description: PGP signature


--- End Message ---

Reply via email to