news 28 Posted March 22, 2016 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: foomatic security update Advisory ID: RHSA-2016:0491-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0491.html Issue date: 2016-03-22 CVE Names: CVE-2010-5325 CVE-2015-8327 CVE-2015-8560 ===================================================================== 1. Summary: An updated foomatic package that fixes three security issues is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Foomatic is a comprehensive, spooler-independent database of printers, printer drivers, and driver descriptions. The package also includes spooler-independent command line interfaces to manipulate queues and to print files and manipulate print jobs. It was discovered that the unhtmlify() function of foomatic-rip did not correctly calculate buffer sizes, possibly leading to a heap-based memory corruption. A malicious attacker could exploit this flaw to cause foomatic-rip to crash or, possibly, execute arbitrary code. (CVE-2010-5325) It was discovered that foomatic-rip failed to remove all shell special characters from inputs used to construct command lines for external programs run by the filter. An attacker could possibly use this flaw to execute arbitrary commands. (CVE-2015-8327, CVE-2015-8560) All foomatic users should upgrade to this updated package, which contains backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1218297 - CVE-2010-5325 foomatic: potential remote arbitrary code execution 1287523 - CVE-2015-8327 cups-filters: foomatic-rip did not consider the back tick as an illegal shell escape character 1291227 - CVE-2015-8560 cups-filters: foomatic-rip did not consider semicolon as illegal shell escape character 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: foomatic-4.0.4-5.el6_7.src.rpm i386: foomatic-4.0.4-5.el6_7.i686.rpm foomatic-debuginfo-4.0.4-5.el6_7.i686.rpm x86_64: foomatic-4.0.4-5.el6_7.x86_64.rpm foomatic-debuginfo-4.0.4-5.el6_7.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: foomatic-4.0.4-5.el6_7.src.rpm x86_64: foomatic-4.0.4-5.el6_7.x86_64.rpm foomatic-debuginfo-4.0.4-5.el6_7.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: foomatic-4.0.4-5.el6_7.src.rpm i386: foomatic-4.0.4-5.el6_7.i686.rpm foomatic-debuginfo-4.0.4-5.el6_7.i686.rpm ppc64: foomatic-4.0.4-5.el6_7.ppc64.rpm foomatic-debuginfo-4.0.4-5.el6_7.ppc64.rpm s390x: foomatic-4.0.4-5.el6_7.s390x.rpm foomatic-debuginfo-4.0.4-5.el6_7.s390x.rpm x86_64: foomatic-4.0.4-5.el6_7.x86_64.rpm foomatic-debuginfo-4.0.4-5.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: foomatic-4.0.4-5.el6_7.src.rpm i386: foomatic-4.0.4-5.el6_7.i686.rpm foomatic-debuginfo-4.0.4-5.el6_7.i686.rpm x86_64: foomatic-4.0.4-5.el6_7.x86_64.rpm foomatic-debuginfo-4.0.4-5.el6_7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2010-5325 https://access.redhat.com/security/cve/CVE-2015-8327 https://access.redhat.com/security/cve/CVE-2015-8560 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFW8bgMXlSAg2UNWIIRAku0AKCD+H9IbvXBMQdriz4yycBJ0Cz+/ACfRvzc kzYt9xNP3vTqE/45NtLzP+0= =xtkT -----END PGP SIGNATURE----- -- Share this post Link to post