First published: Mon Jun 24 2024(Updated: )
Rory McNamara discovered that when starting the cupsd server with a Listen configuration item, the cupsd process fails to validate if bind call passed. An attacker could possibly trick cupsd to perform an arbitrary chmod of the provided argument, providing world-writable access to the target.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/cups | <2.4.7-1.2ubuntu7.1 | 2.4.7-1.2ubuntu7.1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/cups | <2.4.6-0ubuntu3.1 | 2.4.6-0ubuntu3.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/cups | <2.4.1op1-1ubuntu4.9 | 2.4.1op1-1ubuntu4.9 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/cups | <2.3.1-9ubuntu1.7 | 2.3.1-9ubuntu1.7 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/cups | <2.2.7-1ubuntu2.10+esm4 | 2.2.7-1ubuntu2.10+esm4 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/cups | <2.1.3-4ubuntu0.11+esm6 | 2.1.3-4ubuntu0.11+esm6 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability identified by USN-6844-1 is classified as a high severity issue due to potential arbitrary chmod execution.
To resolve the USN-6844-1 vulnerability, update the CUPS package to the appropriate remedial version for your Ubuntu release.
USN-6844-1 affects multiple Ubuntu versions, including 16.04, 18.04, 20.04, 22.04, 23.10, and 24.04.
CUPS, or Common Unix Printing System, is a printing system used by Ubuntu that is significant due to its role in managing print jobs and potential security vulnerabilities.
You can check your CUPS package version against the versions listed in the USN-6844-1 advisory to determine if it is vulnerable.