Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
2023-09-21T23:15:12.293
2025-04-23T17:16:44.910
Modified
CVSSv3.1: 7.0 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | openprinting | cups | < 2.4.7 | Yes |
Application | openprinting | libppd | 2.0 | Yes |
Operating System | fedoraproject | fedora | 37 | Yes |
Operating System | fedoraproject | fedora | 38 | Yes |
Operating System | fedoraproject | fedora | 39 | Yes |
Operating System | debian | debian_linux | 10.0 | Yes |