Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cups | Openprinting | * | 2.4.7 (excluding) |
Libppd | Openprinting | 2.0-rc2 (including) | 2.0-rc2 (including) |
Cups | Ubuntu | bionic | * |
Cups | Ubuntu | devel | * |
Cups | Ubuntu | esm-infra/bionic | * |
Cups | Ubuntu | esm-infra/focal | * |
Cups | Ubuntu | esm-infra/xenial | * |
Cups | Ubuntu | focal | * |
Cups | Ubuntu | jammy | * |
Cups | Ubuntu | lunar | * |
Cups | Ubuntu | mantic | * |
Cups | Ubuntu | noble | * |
Cups | Ubuntu | oracular | * |
Cups | Ubuntu | plucky | * |
Cups | Ubuntu | questing | * |
Cups | Ubuntu | trusty | * |
Cups | Ubuntu | xenial | * |
Libppd | Ubuntu | bionic | * |
Libppd | Ubuntu | devel | * |
Libppd | Ubuntu | focal | * |
Libppd | Ubuntu | lunar | * |
Libppd | Ubuntu | mantic | * |
Libppd | Ubuntu | noble | * |
Libppd | Ubuntu | oracular | * |
Libppd | Ubuntu | plucky | * |
Libppd | Ubuntu | questing | * |
Libppd | Ubuntu | trusty | * |
Libppd | Ubuntu | xenial | * |