Bug 2314289 (CVE-2024-47177)

Summary: CVE-2024-47177 cups-filters: foomatic: foomatic-rip in cups-filters allows arbitrary command execution via the FoomaticRIPCommandLine PPD parameter
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerability-draftAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: asdas, bmontgom, dpaolell, eparis, erack, gnaik, gotiwari, jburrell, jdelft, jhorak, jupierce, jwest, jwright, kyoshida, lgarciaa, mbiarnes, mvyas, nstielau, security-response-team, sidsharm, sponnaga, talessio, tpopela, vlaad, ximhan, yuxzhu, zdohnal, zmiele
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
CVE-2024-47177 has been rejected by the publishing CNA together with the upstream and is a duplicate of CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2315003, 2315005    
Bug Blocks:    

Description OSIDB Bzimport 2024-09-23 20:12:08 UTC
A security flaw was found in OpenPrinting CUPS. A remote attacker may be able to exploit cups-filters via the `FoomaticRIPCommandLine` entry in the PPD file, which would trigger the CUPS system to execute any arbitrary commands injected into that file when a print job is sent to the affected device.