Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:4768: Red Hat Security Advisory: cups security update

An update for cups is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-32360: A vulnerability was found in OpenPrinting CUPS. Unauthorized users are permitted to fetch documents over local or remote networks, leading to confidentiality breach.
Red Hat Security Data
#vulnerability#linux#red_hat#auth#sap

Issued:

2023-08-28

Updated:

2023-08-28

RHSA-2023:4768 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: cups security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for cups is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.

Security Fix(es):

  • cups: Information leak through Cups-Get-Document operation (CVE-2023-32360)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the cupsd service will be restarted automatically.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64

Fixes

  • BZ - 2230495 - CVE-2023-32360 cups: Information leak through Cups-Get-Document operation

Red Hat Enterprise Linux Server - AUS 8.4

SRPM

cups-2.2.6-38.el8_4.2.src.rpm

SHA-256: 8e3c502bb0a3dc1e96ae3c4696f82a5b917d2f7321398e372fc6a4ee4203547c

x86_64

cups-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 84281d9e82c275f09f7552fe4e87402160b42a83ad69daacb037156c449fe3ef

cups-client-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: b04c83f82f87fdd1496130bf591b366e72c4982aba14ec793aa3b1ddc2bb38c5

cups-client-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 74f444da535de7c5fd5850cf229b6dab3495858362265c77c75527f013632569

cups-client-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 74f444da535de7c5fd5850cf229b6dab3495858362265c77c75527f013632569

cups-client-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: a84ab9b5f1ccb801ac4bac0f286c690f435fae7bb9e5910966e1bd22d2424eae

cups-client-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: a84ab9b5f1ccb801ac4bac0f286c690f435fae7bb9e5910966e1bd22d2424eae

cups-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: dbdf2c9c8baf96c302bc5e7207a916d70238c1b2f1f6a6c713d8bf4764ab5c1c

cups-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: dbdf2c9c8baf96c302bc5e7207a916d70238c1b2f1f6a6c713d8bf4764ab5c1c

cups-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 832ad7dbedc2f952c25b66e9e3a96ed9785db66b5cde2c544ddf94b87d7b2090

cups-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 832ad7dbedc2f952c25b66e9e3a96ed9785db66b5cde2c544ddf94b87d7b2090

cups-debugsource-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 564fe57d0f1f88dd33b519ab1c24d935e54af3db9b666db519c6f2411046d7ff

cups-debugsource-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 564fe57d0f1f88dd33b519ab1c24d935e54af3db9b666db519c6f2411046d7ff

cups-debugsource-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 66d34cf04c8dad2bb28a3967832aeef3a110a32fdb8322abd557ed560bbf2837

cups-debugsource-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 66d34cf04c8dad2bb28a3967832aeef3a110a32fdb8322abd557ed560bbf2837

cups-devel-2.2.6-38.el8_4.2.i686.rpm

SHA-256: b735282fac106f1ad92f006b4118ee401c8f43eda65d42b9277f9d1dc1ec2278

cups-devel-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 57a0f1367656f196b7905a890863078c6736ea11dffb452ec305d4c8c5a00c7f

cups-filesystem-2.2.6-38.el8_4.2.noarch.rpm

SHA-256: 89e8f597881e926db5293b25e381871ff4caddbf5b3957e8f004ac9c3feca79d

cups-ipptool-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 9d32d4915dedaa8f60112de6ffc9114d273d5af79ac23290c0f2733cb1eca94a

cups-ipptool-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 3c869b19cb47ec1e986072a822643ae8dfbeb6e528af6682d1b98e5ff8b85993

cups-ipptool-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 3c869b19cb47ec1e986072a822643ae8dfbeb6e528af6682d1b98e5ff8b85993

cups-ipptool-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 25e84fcad7f74a084d079a203eaae6dd1b9f53725aae7e5ae439c210f1f055c5

cups-ipptool-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 25e84fcad7f74a084d079a203eaae6dd1b9f53725aae7e5ae439c210f1f055c5

cups-libs-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 7070fe83f7c2c0e603338c2c78550d8ace841e9393a71e5736d72ed9cc1c0568

cups-libs-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: a12e97f39aca3187b9b0160ab8713a331007b12dc20dc0d021417bec08ed77f6

cups-libs-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: a3739e56d36e6854932974e6ae03003894cd033f62e82c481c40df258de447f7

cups-libs-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: a3739e56d36e6854932974e6ae03003894cd033f62e82c481c40df258de447f7

cups-libs-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 301cf386358885470ccd9f63b8d5746344b044b79ecfd074a129441d026aaaa9

cups-libs-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 301cf386358885470ccd9f63b8d5746344b044b79ecfd074a129441d026aaaa9

cups-lpd-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 3945b3d040860876fe7e0572f6abe46e351ecac68bc856615833f8beecf64878

cups-lpd-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 58dba762d486819049e67564aa37e86d494d3b2a2b179cabf2e29939be91d7cc

cups-lpd-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 58dba762d486819049e67564aa37e86d494d3b2a2b179cabf2e29939be91d7cc

cups-lpd-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 9c3fb984d3b0ed45ab4a3bc70e5c9c3f0498d21d2a757f8491ab66ec54454af5

cups-lpd-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 9c3fb984d3b0ed45ab4a3bc70e5c9c3f0498d21d2a757f8491ab66ec54454af5

Red Hat Enterprise Linux Server - TUS 8.4

SRPM

cups-2.2.6-38.el8_4.2.src.rpm

SHA-256: 8e3c502bb0a3dc1e96ae3c4696f82a5b917d2f7321398e372fc6a4ee4203547c

x86_64

cups-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 84281d9e82c275f09f7552fe4e87402160b42a83ad69daacb037156c449fe3ef

cups-client-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: b04c83f82f87fdd1496130bf591b366e72c4982aba14ec793aa3b1ddc2bb38c5

cups-client-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 74f444da535de7c5fd5850cf229b6dab3495858362265c77c75527f013632569

cups-client-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 74f444da535de7c5fd5850cf229b6dab3495858362265c77c75527f013632569

cups-client-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: a84ab9b5f1ccb801ac4bac0f286c690f435fae7bb9e5910966e1bd22d2424eae

cups-client-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: a84ab9b5f1ccb801ac4bac0f286c690f435fae7bb9e5910966e1bd22d2424eae

cups-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: dbdf2c9c8baf96c302bc5e7207a916d70238c1b2f1f6a6c713d8bf4764ab5c1c

cups-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: dbdf2c9c8baf96c302bc5e7207a916d70238c1b2f1f6a6c713d8bf4764ab5c1c

cups-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 832ad7dbedc2f952c25b66e9e3a96ed9785db66b5cde2c544ddf94b87d7b2090

cups-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 832ad7dbedc2f952c25b66e9e3a96ed9785db66b5cde2c544ddf94b87d7b2090

cups-debugsource-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 564fe57d0f1f88dd33b519ab1c24d935e54af3db9b666db519c6f2411046d7ff

cups-debugsource-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 564fe57d0f1f88dd33b519ab1c24d935e54af3db9b666db519c6f2411046d7ff

cups-debugsource-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 66d34cf04c8dad2bb28a3967832aeef3a110a32fdb8322abd557ed560bbf2837

cups-debugsource-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 66d34cf04c8dad2bb28a3967832aeef3a110a32fdb8322abd557ed560bbf2837

cups-devel-2.2.6-38.el8_4.2.i686.rpm

SHA-256: b735282fac106f1ad92f006b4118ee401c8f43eda65d42b9277f9d1dc1ec2278

cups-devel-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 57a0f1367656f196b7905a890863078c6736ea11dffb452ec305d4c8c5a00c7f

cups-filesystem-2.2.6-38.el8_4.2.noarch.rpm

SHA-256: 89e8f597881e926db5293b25e381871ff4caddbf5b3957e8f004ac9c3feca79d

cups-ipptool-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 9d32d4915dedaa8f60112de6ffc9114d273d5af79ac23290c0f2733cb1eca94a

cups-ipptool-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 3c869b19cb47ec1e986072a822643ae8dfbeb6e528af6682d1b98e5ff8b85993

cups-ipptool-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 3c869b19cb47ec1e986072a822643ae8dfbeb6e528af6682d1b98e5ff8b85993

cups-ipptool-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 25e84fcad7f74a084d079a203eaae6dd1b9f53725aae7e5ae439c210f1f055c5

cups-ipptool-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 25e84fcad7f74a084d079a203eaae6dd1b9f53725aae7e5ae439c210f1f055c5

cups-libs-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 7070fe83f7c2c0e603338c2c78550d8ace841e9393a71e5736d72ed9cc1c0568

cups-libs-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: a12e97f39aca3187b9b0160ab8713a331007b12dc20dc0d021417bec08ed77f6

cups-libs-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: a3739e56d36e6854932974e6ae03003894cd033f62e82c481c40df258de447f7

cups-libs-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: a3739e56d36e6854932974e6ae03003894cd033f62e82c481c40df258de447f7

cups-libs-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 301cf386358885470ccd9f63b8d5746344b044b79ecfd074a129441d026aaaa9

cups-libs-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 301cf386358885470ccd9f63b8d5746344b044b79ecfd074a129441d026aaaa9

cups-lpd-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 3945b3d040860876fe7e0572f6abe46e351ecac68bc856615833f8beecf64878

cups-lpd-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 58dba762d486819049e67564aa37e86d494d3b2a2b179cabf2e29939be91d7cc

cups-lpd-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 58dba762d486819049e67564aa37e86d494d3b2a2b179cabf2e29939be91d7cc

cups-lpd-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 9c3fb984d3b0ed45ab4a3bc70e5c9c3f0498d21d2a757f8491ab66ec54454af5

cups-lpd-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 9c3fb984d3b0ed45ab4a3bc70e5c9c3f0498d21d2a757f8491ab66ec54454af5

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM

cups-2.2.6-38.el8_4.2.src.rpm

SHA-256: 8e3c502bb0a3dc1e96ae3c4696f82a5b917d2f7321398e372fc6a4ee4203547c

ppc64le

cups-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: f68a8baee563c7a34c6c91c03ca9d31836855aabff57e2f2c406d47cd2c03fc5

cups-client-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: 086748fea323d668120b0628a0baa33f736c81b2a916815c98c17215d27ad047

cups-client-debuginfo-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: d85df07e018e11dd999c28f7af9b8b4e2b4d65d98a0724eed86a9fd8e1e215bb

cups-client-debuginfo-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: d85df07e018e11dd999c28f7af9b8b4e2b4d65d98a0724eed86a9fd8e1e215bb

cups-debuginfo-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: 365cd9cddb99f573c0d47f85d827e63c4774aeba736c54f56a5fa3922a6acd8e

cups-debuginfo-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: 365cd9cddb99f573c0d47f85d827e63c4774aeba736c54f56a5fa3922a6acd8e

cups-debugsource-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: eef74d8d6ce5b9994d2cf563f18915a3271dc659a046cf97dda369f08005ece9

cups-debugsource-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: eef74d8d6ce5b9994d2cf563f18915a3271dc659a046cf97dda369f08005ece9

cups-devel-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: 1c6a5069a3e99edaf34657f166908f112de675a706d677bade21fc02ef4e46ae

cups-filesystem-2.2.6-38.el8_4.2.noarch.rpm

SHA-256: 89e8f597881e926db5293b25e381871ff4caddbf5b3957e8f004ac9c3feca79d

cups-ipptool-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: eb22447fd1d60e4ae805750828ae2808c038f06888499584495ebfef4558f0ec

cups-ipptool-debuginfo-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: 74af3f38861844a3c35cd2ed432a6e09ab01e61434a80b75afffb226fa95afd1

cups-ipptool-debuginfo-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: 74af3f38861844a3c35cd2ed432a6e09ab01e61434a80b75afffb226fa95afd1

cups-libs-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: c390ef2f5e0eff0498d02d80fb47b934405ba302173e3f9026a60b2d831adcb4

cups-libs-debuginfo-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: ad36b6b3f48eee3cb0d82df76d15d6dd165de5d0dd1507f5f008a67be5037cce

cups-libs-debuginfo-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: ad36b6b3f48eee3cb0d82df76d15d6dd165de5d0dd1507f5f008a67be5037cce

cups-lpd-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: b9e9e936c9ce52436a0e7395693d8ffcdb266acbd6dbd940d2ca40069e9c8392

cups-lpd-debuginfo-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: 955a62bf68463018dc731ca899f7e95d0261f12767aede3705ab312ae3ea31d5

cups-lpd-debuginfo-2.2.6-38.el8_4.2.ppc64le.rpm

SHA-256: 955a62bf68463018dc731ca899f7e95d0261f12767aede3705ab312ae3ea31d5

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM

cups-2.2.6-38.el8_4.2.src.rpm

SHA-256: 8e3c502bb0a3dc1e96ae3c4696f82a5b917d2f7321398e372fc6a4ee4203547c

x86_64

cups-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 84281d9e82c275f09f7552fe4e87402160b42a83ad69daacb037156c449fe3ef

cups-client-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: b04c83f82f87fdd1496130bf591b366e72c4982aba14ec793aa3b1ddc2bb38c5

cups-client-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 74f444da535de7c5fd5850cf229b6dab3495858362265c77c75527f013632569

cups-client-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 74f444da535de7c5fd5850cf229b6dab3495858362265c77c75527f013632569

cups-client-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: a84ab9b5f1ccb801ac4bac0f286c690f435fae7bb9e5910966e1bd22d2424eae

cups-client-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: a84ab9b5f1ccb801ac4bac0f286c690f435fae7bb9e5910966e1bd22d2424eae

cups-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: dbdf2c9c8baf96c302bc5e7207a916d70238c1b2f1f6a6c713d8bf4764ab5c1c

cups-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: dbdf2c9c8baf96c302bc5e7207a916d70238c1b2f1f6a6c713d8bf4764ab5c1c

cups-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 832ad7dbedc2f952c25b66e9e3a96ed9785db66b5cde2c544ddf94b87d7b2090

cups-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 832ad7dbedc2f952c25b66e9e3a96ed9785db66b5cde2c544ddf94b87d7b2090

cups-debugsource-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 564fe57d0f1f88dd33b519ab1c24d935e54af3db9b666db519c6f2411046d7ff

cups-debugsource-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 564fe57d0f1f88dd33b519ab1c24d935e54af3db9b666db519c6f2411046d7ff

cups-debugsource-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 66d34cf04c8dad2bb28a3967832aeef3a110a32fdb8322abd557ed560bbf2837

cups-debugsource-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 66d34cf04c8dad2bb28a3967832aeef3a110a32fdb8322abd557ed560bbf2837

cups-devel-2.2.6-38.el8_4.2.i686.rpm

SHA-256: b735282fac106f1ad92f006b4118ee401c8f43eda65d42b9277f9d1dc1ec2278

cups-devel-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 57a0f1367656f196b7905a890863078c6736ea11dffb452ec305d4c8c5a00c7f

cups-filesystem-2.2.6-38.el8_4.2.noarch.rpm

SHA-256: 89e8f597881e926db5293b25e381871ff4caddbf5b3957e8f004ac9c3feca79d

cups-ipptool-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 9d32d4915dedaa8f60112de6ffc9114d273d5af79ac23290c0f2733cb1eca94a

cups-ipptool-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 3c869b19cb47ec1e986072a822643ae8dfbeb6e528af6682d1b98e5ff8b85993

cups-ipptool-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 3c869b19cb47ec1e986072a822643ae8dfbeb6e528af6682d1b98e5ff8b85993

cups-ipptool-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 25e84fcad7f74a084d079a203eaae6dd1b9f53725aae7e5ae439c210f1f055c5

cups-ipptool-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 25e84fcad7f74a084d079a203eaae6dd1b9f53725aae7e5ae439c210f1f055c5

cups-libs-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 7070fe83f7c2c0e603338c2c78550d8ace841e9393a71e5736d72ed9cc1c0568

cups-libs-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: a12e97f39aca3187b9b0160ab8713a331007b12dc20dc0d021417bec08ed77f6

cups-libs-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: a3739e56d36e6854932974e6ae03003894cd033f62e82c481c40df258de447f7

cups-libs-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: a3739e56d36e6854932974e6ae03003894cd033f62e82c481c40df258de447f7

cups-libs-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 301cf386358885470ccd9f63b8d5746344b044b79ecfd074a129441d026aaaa9

cups-libs-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 301cf386358885470ccd9f63b8d5746344b044b79ecfd074a129441d026aaaa9

cups-lpd-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 3945b3d040860876fe7e0572f6abe46e351ecac68bc856615833f8beecf64878

cups-lpd-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 58dba762d486819049e67564aa37e86d494d3b2a2b179cabf2e29939be91d7cc

cups-lpd-debuginfo-2.2.6-38.el8_4.2.i686.rpm

SHA-256: 58dba762d486819049e67564aa37e86d494d3b2a2b179cabf2e29939be91d7cc

cups-lpd-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 9c3fb984d3b0ed45ab4a3bc70e5c9c3f0498d21d2a757f8491ab66ec54454af5

cups-lpd-debuginfo-2.2.6-38.el8_4.2.x86_64.rpm

SHA-256: 9c3fb984d3b0ed45ab4a3bc70e5c9c3f0498d21d2a757f8491ab66ec54454af5

The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.

Related news

CVE-2023-48660: DSA-2023-443: Dell PowerMaxOS 5978, Dell Unisphere 360, Dell Unisphere for PowerMax, Dell Unisphere for PowerMax Virtual Appliance, Dell Solutions Enabler Virtual Appliance, and Dell PowerMax EEM Secu

Dell vApp Manger, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote attacker could potentially exploit this vulnerability to read arbitrary files from the target system.

Ubuntu Security Notice USN-6361-2

Ubuntu Security Notice 6361-2 - USN-6361-1 fixed a vulnerability in CUPS. This update provides the corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. It was discovered that CUPS incorrectly authenticated certain remote requests. A remote attacker could possibly use this issue to obtain recently printed documents.

Red Hat Security Advisory 2023-5314-01

Red Hat Security Advisory 2023-5314-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

RHSA-2023:5095: Red Hat Security Advisory: Logging Subsystem 5.6.11 - Red Hat OpenShift security update

Logging Subsystem 5.6.11 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-4456: A flaw was found in openshift-logging LokiStack. The key used for caching is just the token, which is too broad. This issue allows a user with a token valid for one action to execute other actions as long as the authorization allowing the original action is still cached.

RHSA-2023:5096: Red Hat Security Advisory: Logging Subsystem 5.5.16 - Red Hat OpenShift security update

Logging Subsystem 5.5.16 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-4456: A flaw was found in openshift-logging LokiStack. The key used for caching is just the token, which is too broad. This issue allows a user with a token valid for one action to execute other actions as long as the authorization allowing the original action is still cached.

Red Hat Security Advisory 2023-4933-01

Red Hat Security Advisory 2023-4933-01 - Logging Subsystem 5.7.6 addresses an issues where LokiStack authorization is cached too broadly.

Red Hat Security Advisory 2023-5001-01

Red Hat Security Advisory 2023-5001-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.49. Issues addressed include a bypass vulnerability.

Ubuntu Security Notice USN-6361-1

Ubuntu Security Notice 6361-1 - It was discovered that CUPS incorrectly authenticated certain remote requests. A remote attacker could possibly use this issue to obtain recently printed documents.

RHSA-2023:5001: Red Hat Security Advisory: OpenShift Container Platform 4.11.49 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.49 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-46146: A flaw was found in exporter-toolkit. A request can be forged by an attacker to poison the internal cache used to cache hashes and make subsequent successful requests. This cache is ...

Red Hat Security Advisory 2023-4921-01

Red Hat Security Advisory 2023-4921-01 - Red Hat Single Sign-On is an integrated sign-on solution, available as a Red Hat JBoss Middleware for OpenShift containerized image. The Red Hat Single Sign-On for OpenShift image provides an authentication server that you can use to log in centrally, log out, and register. You can also manage user accounts for web applications, mobile applications, and RESTful web services. This erratum releases a new image for Red Hat Single Sign-On 7.6.5 for use within the OpenShift Container Platform 3.10, OpenShift Container Platform 3.11, and within the OpenShift Container Platform 4.3 cloud computing Platform-as-a-Service for on-premise or private cloud deployments, aligning with the standalone product release. Issues addressed include a denial of service vulnerability.

RHSA-2023:4921: Red Hat Security Advisory: Red Hat Single Sign-On 7.6.5 for OpenShift image enhancement and security update

A new image is available for Red Hat Single Sign-On 7.6.5, running on OpenShift Container Platform 3.10 and 3.11, and 4.3. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46877: A flaw was found in Jackson Databind. This issue may allow a malicious user to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization. * CVE-2023-1436: A flaw was found in Jettison. Infinite recursion is triggered in Jettison w...

Red Hat Security Advisory 2023-4864-01

Red Hat Security Advisory 2023-4864-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include an information leakage vulnerability.

Red Hat Security Advisory 2023-4838-01

Red Hat Security Advisory 2023-4838-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include an information leakage vulnerability.

Red Hat Security Advisory 2023-4769-01

Red Hat Security Advisory 2023-4769-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include an information leakage vulnerability.

RHSA-2023:4771: Red Hat Security Advisory: cups security update

An update for cups is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32360: A vulnerability was found in OpenPrinting CUPS. Unauthorized users are permitted to fetch documents over local or remote networks, leading to confidentiality breach.

RHSA-2023:4766: Red Hat Security Advisory: cups security update

An update for cups is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32360: A vulnerability was found in OpenPrinting CUPS. Unauthorized users are permitted to fetch documents over local or remote networks, leading to confidentiality breach.

CVE-2023-32369: About the security content of macOS Big Sur 11.7.7

A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.4, macOS Big Sur 11.7.7, macOS Monterey 12.6.6. An app may be able to modify protected parts of the file system

CVE-2023-27940: About the security content of macOS Monterey 12.6.6

The issue was addressed with additional permissions checks. This issue is fixed in macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, macOS Monterey 12.6.6. A sandboxed app may be able to observe system-wide network connections

CVE-2023-32363: About the security content of macOS Ventura 13.4

A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in macOS Ventura 13.4. An app may be able to bypass Privacy preferences