OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function format_log_line
could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file cupsd.conf
sets the value of loglevel
to DEBUG
. No known patches or workarounds exist at time of publication.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cups | Openprinting | * | 2.4.2 (including) |
Cups | Ubuntu | bionic | * |
Cups | Ubuntu | devel | * |
Cups | Ubuntu | esm-infra/xenial | * |
Cups | Ubuntu | focal | * |
Cups | Ubuntu | jammy | * |
Cups | Ubuntu | kinetic | * |
Cups | Ubuntu | lunar | * |
Cups | Ubuntu | trusty | * |
Cups | Ubuntu | xenial | * |
Red Hat Enterprise Linux 8 | RedHat | cups-1:2.2.6-54.el8_9 | * |
Red Hat Enterprise Linux 8 | RedHat | cups-1:2.2.6-54.el8_9 | * |
Red Hat Enterprise Linux 8.6 Extended Update Support | RedHat | cups-1:2.2.6-45.el8_6.4 | * |
Red Hat Enterprise Linux 8.8 Extended Update Support | RedHat | cups-1:2.2.6-51.el8_8.3 | * |
Red Hat Enterprise Linux 9 | RedHat | cups-1:2.3.3op2-21.el9 | * |
Red Hat Enterprise Linux 9 | RedHat | cups-1:2.3.3op2-21.el9 | * |