First published: Thu Jun 22 2023(Updated: )
It was discovered that CUPS incorrectly handled certain memory operations. An attacker could possibly use this issue to cause CUPS to crash, resulting in a denial of service, or possibly obtain sensitive information.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/cups | <2.4.2-3ubuntu2.2 | 2.4.2-3ubuntu2.2 |
=23.04 | ||
All of | ||
ubuntu/cups | <2.4.2-1ubuntu2.2 | 2.4.2-1ubuntu2.2 |
=22.10 | ||
All of | ||
ubuntu/cups | <2.4.1op1-1ubuntu4.4 | 2.4.1op1-1ubuntu4.4 |
=22.04 | ||
All of | ||
ubuntu/cups | <2.3.1-9ubuntu1.4 | 2.3.1-9ubuntu1.4 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this CUPS vulnerability is USN-6184-1.
This vulnerability could cause CUPS to crash, resulting in a denial of service or potentially obtaining sensitive information.
The affected software versions include CUPS 2.4.2-3ubuntu2.2, 2.4.2-1ubuntu2.2, 2.4.1op1-1ubuntu4.4, and 2.3.1-9ubuntu1.4 on Ubuntu 23.04, 22.10, 22.04, and 20.04, respectively.
To fix this vulnerability, update CUPS to version 2.4.2-3ubuntu2.2 or later.
More information about this vulnerability can be found at the following references: [1](https://ubuntu.com/security/CVE-2023-34241), [2](https://ubuntu.com/security/notices/USN-6184-2), [3](https://launchpad.net/ubuntu/+source/cups/2.4.2-3ubuntu2.2).