Описание
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | released | 2.4.6-0ubuntu2 |
esm-infra/bionic | released | 2.2.7-1ubuntu2.10+esm2 |
esm-infra/focal | not-affected | 2.3.1-9ubuntu1.6 |
esm-infra/xenial | released | 2.1.3-4ubuntu0.11+esm4 |
focal | released | 2.3.1-9ubuntu1.6 |
jammy | released | 2.4.1op1-1ubuntu4.7 |
lunar | released | 2.4.2-3ubuntu2.5 |
mantic | released | 2.4.6-0ubuntu2 |
noble | released | 2.4.6-0ubuntu2 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | released | 2:2.0~rc1-0ubuntu4 |
esm-apps/bionic | needs-triage | |
esm-apps/focal | needs-triage | |
esm-apps/jammy | needs-triage | |
esm-apps/xenial | needs-triage | |
focal | ignored | end of standard support, was needs-triage |
jammy | needs-triage | |
lunar | released | 2:2.0~rc1-0ubuntu1.2 |
mantic | released | 2:2.0~rc1-0ubuntu4 |
Показывать по
EPSS
7 High
CVSS3
Связанные уязвимости
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
Due to failure in validating the length provided by an attacker-crafte ...
Уязвимость функции scan_ps() библиотеки libppd сервера печати CUPS, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
EPSS
7 High
CVSS3