Skip to content

Commit d235032

Browse files
committed
fix(e2e): account for RHSA-2025:0083 (#1767)
1 parent d4480c3 commit d235032

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

e2etests/testcase_test.go

+5-5
Original file line numberDiff line numberDiff line change
@@ -4394,15 +4394,15 @@ All OpenShift Container Platform 4.10 users are advised to upgrade to these upda
43944394
VersionFormat: "rpm",
43954395
Version: "1:2.2.6-60.el8_10.x86_64",
43964396
AddedBy: "sha256:7a6d2526dba4ead4120381a83ce344db5959e947aab63fa3d1a3fae4f7986d62",
4397-
FixedBy: "",
4397+
FixedBy: "1:2.2.6-62.el8_10",
43984398
Vulnerabilities: []apiV1.Vulnerability{
43994399
{
4400-
Name: "CVE-2024-47175",
4400+
Name: "RHSA-2025:0083",
44014401
NamespaceName: "rhel:8",
4402-
Description: "DOCUMENTATION: A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer's capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nThe ppdCreatePPDFromIPP2 function in libppd doesn't properly check or clean IPP attributes before writing them to a temporary PPD file. This means that a remote attacker, who has control of or has hijacked an exposed printer (through UPD or mDNS), could send a harmful IPP attribute and potentially insert malicious commands into the PPD file. \n STATEMENT: RHCOS and RHEL include libs-cups as a build-time dependency. However, the vulnerability is not exploitable with just the client libraries unless a print server based on OpenPrinting is actively running.\n\nRHEL and RHCOS does not have cups-browsed enabled by default so the impact for those are set to 'Low'\n MITIGATION: See the security bulletin for a detailed mitigation procedure.",
4403-
Link: "https://access.redhat.com/security/cve/CVE-2024-47175",
4402+
Description: "The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.\n\nSecurity Fix(es):\n\n* cups: libppd: remote command injection via attacker controlled data in PPD file (CVE-2024-47175)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
4403+
Link: "https://access.redhat.com/errata/RHSA-2025:0083",
44044404
Severity: "Low",
4405-
FixedBy: "",
4405+
FixedBy: "1:2.2.6-62.el8_10",
44064406
Metadata: map[string]interface{}{
44074407
"Red Hat": map[string]interface{}{
44084408
"CVSSv2": map[string]interface{}{

0 commit comments

Comments
 (0)