[CLSA-2025:1741215440] Fix CVE(s): CVE-2024-47175
Type:
security
Severity:
Important
Release date:
2025-03-05 22:57:25 UTC
Description:
* SECURITY UPDATE: PPD injection issues - debian/patches/CVE-2024-47175.patch: validate URIs, attribute names, capabilities, and sanitize make and model in cups/ppd-cache.c, scheduler/ipp.c - CVE-2024-47175
Updated packages:
  • cups_2.2.7-1ubuntu2.10+tuxcare.els4_amd64.deb
    sha:f408db213ac093d26818c11c80185d76a3e8b7dd
  • cups-bsd_2.2.7-1ubuntu2.10+tuxcare.els4_amd64.deb
    sha:700434954fac4a405e2c7edb9fe520d884e36d58
  • cups-client_2.2.7-1ubuntu2.10+tuxcare.els4_amd64.deb
    sha:19b335a344beaf88f13c24a7200555cf8c0147eb
  • cups-common_2.2.7-1ubuntu2.10+tuxcare.els4_all.deb
    sha:b63e1f125ca432d6a49059500387b64a5c79a602
  • cups-core-drivers_2.2.7-1ubuntu2.10+tuxcare.els4_amd64.deb
    sha:ac446927360cf684a35ac041b1488e0d19912fa0
  • cups-daemon_2.2.7-1ubuntu2.10+tuxcare.els4_amd64.deb
    sha:3ea0e35947dde16c058978e44e99d0016b1f09f2
  • cups-ipp-utils_2.2.7-1ubuntu2.10+tuxcare.els4_amd64.deb
    sha:8c8eefe0917bc760e0339c1b85af44c1834259b9
  • cups-ppdc_2.2.7-1ubuntu2.10+tuxcare.els4_amd64.deb
    sha:97da409329bedcd7c85231541bdb8fc53eb55df0
  • cups-server-common_2.2.7-1ubuntu2.10+tuxcare.els4_all.deb
    sha:10dfd10492082f0ec2fd66bdb768e4b8ebafc852
  • libcups2_2.2.7-1ubuntu2.10+tuxcare.els4_amd64.deb
    sha:6bd78f9d1eefe94a347f05633bf9add620acb470
  • libcups2-dev_2.2.7-1ubuntu2.10+tuxcare.els4_amd64.deb
    sha:b7e984bc7cd116b3f9d0a40ae0b0d58655ac3bd0
  • libcupscgi1_2.2.7-1ubuntu2.10+tuxcare.els4_amd64.deb
    sha:8c97d38fa38bf778c7eb9350aefae2c325702285
  • libcupsimage2_2.2.7-1ubuntu2.10+tuxcare.els4_amd64.deb
    sha:5c1ad21ac1ee8bbed20742dd5a1c7f16c78e3114
  • libcupsimage2-dev_2.2.7-1ubuntu2.10+tuxcare.els4_amd64.deb
    sha:9d178ad50f6603598df6f92e53b26aaa20b53d29
  • libcupsmime1_2.2.7-1ubuntu2.10+tuxcare.els4_amd64.deb
    sha:e2c7a6817c88b14d76b529dd3e58546fcd751ab8
  • libcupsppdc1_2.2.7-1ubuntu2.10+tuxcare.els4_amd64.deb
    sha:4a48468c18d913abd56ee85ce2dbdf0136628a48
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.