USN-6844-1: CUPS vulnerability

Publication date

24 June 2024

Overview

CUPS could be made to arbitrary chmod paths with specially crafted configuration file.


Packages

  • cups - Common UNIX Printing System(tm)

Details

Rory McNamara discovered that when starting the cupsd server with a
Listen configuration item, the cupsd process fails to validate if
bind call passed. An attacker could possibly trick cupsd to perform
an arbitrary chmod of the provided argument, providing world-writable
access to the target.

Rory McNamara discovered that when starting the cupsd server with a
Listen configuration item, the cupsd process fails to validate if
bind call passed. An attacker could possibly trick cupsd to perform
an arbitrary chmod of the provided argument, providing world-writable
access to the target.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
24.04 noble cups –  2.4.7-1.2ubuntu7.1
23.10 mantic cups –  2.4.6-0ubuntu3.1
22.04 jammy cups –  2.4.1op1-1ubuntu4.9
20.04 focal cups –  2.3.1-9ubuntu1.7
18.04 bionic cups –  2.2.7-1ubuntu2.10+esm4  
16.04 xenial cups –  2.1.3-4ubuntu0.11+esm6  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›