OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function format_log_line could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file cupsd.conf sets the value of loglevel to DEBUG. No known patches or workarounds exist at time of publication.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Cups | Openprinting | * | 2.4.2 (including) |
| Red Hat Enterprise Linux 8 | RedHat | cups-1:2.2.6-54.el8_9 | * |
| Red Hat Enterprise Linux 8 | RedHat | cups-1:2.2.6-54.el8_9 | * |
| Red Hat Enterprise Linux 8.6 Extended Update Support | RedHat | cups-1:2.2.6-45.el8_6.4 | * |
| Red Hat Enterprise Linux 8.8 Extended Update Support | RedHat | cups-1:2.2.6-51.el8_8.3 | * |
| Red Hat Enterprise Linux 9 | RedHat | cups-1:2.3.3op2-21.el9 | * |
| Red Hat Enterprise Linux 9 | RedHat | cups-1:2.3.3op2-21.el9 | * |
| Cups | Ubuntu | bionic | * |
| Cups | Ubuntu | devel | * |
| Cups | Ubuntu | esm-infra/bionic | * |
| Cups | Ubuntu | esm-infra/focal | * |
| Cups | Ubuntu | esm-infra/xenial | * |
| Cups | Ubuntu | focal | * |
| Cups | Ubuntu | jammy | * |
| Cups | Ubuntu | kinetic | * |
| Cups | Ubuntu | lunar | * |
| Cups | Ubuntu | trusty | * |
| Cups | Ubuntu | xenial | * |