First published: Wed Sep 20 2023(Updated: )
It was discovered that CUPS incorrectly parsed certain Postscript objects. If a user or automated system were tricked into printing a specially crafted document, a remote attacker could use this issue to cause CUPS to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/cups | <2.4.2-3ubuntu2.5 | 2.4.2-3ubuntu2.5 |
Ubuntu Linux | =23.04 | |
All of | ||
ubuntu/cups | <2.4.1op1-1ubuntu4.7 | 2.4.1op1-1ubuntu4.7 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/cups | <2.3.1-9ubuntu1.6 | 2.3.1-9ubuntu1.6 |
Ubuntu Linux | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the CUPS vulnerability is USN-6391-1.
The CUPS vulnerability can cause CUPS to crash, resulting in a denial of service, or possibly execute arbitrary code.
The CUPS vulnerability affects versions 2.4.2-3ubuntu2.5, 2.4.1op1-1ubuntu4.7, and 2.3.1-9ubuntu1.6 of the CUPS package on Ubuntu.
To mitigate the CUPS vulnerability, it is recommended to update the CUPS package to version 2.4.2-3ubuntu2.5, 2.4.1op1-1ubuntu4.7, or 2.3.1-9ubuntu1.6, depending on the Ubuntu version.
More information about the CUPS vulnerability can be found at the following references: [CVE-2023-4504](https://ubuntu.com/security/CVE-2023-4504), [USN-6392-1](https://ubuntu.com/security/notices/USN-6392-1), [USN-6391-2](https://ubuntu.com/security/notices/USN-6391-2).