USN-7043-1 fixed vulnerabilities in cups-filters. This update improves the fix for CVE-2024-47176 by removing support for the legacy CUPS printer discovery protocol entirely.
Original advisory details:
Simone Margaritelli discovered that the cups-filters cups-browsed component could be used to create arbitrary printers from outside the local network. In combination with issues in other printing components, a remote attacker could possibly use this issue to connect to a system, created manipulated PPD files, and execute arbitrary code when a printer is used. This update disables support for the legacy CUPS printer discovery protocol. (CVE-2024-47176)
Simone Margaritelli discovered that cups-filters incorrectly sanitized IPP data when creating PPD files. A remote attacker could possibly use this issue to manipulate PPD files and execute arbitrary code when a printer is used. (CVE-2024-47076)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.27.4-1ubuntu0.4", "binary_name": "cups-browsed" }, { "binary_version": "1.27.4-1ubuntu0.4", "binary_name": "cups-filters" }, { "binary_version": "1.27.4-1ubuntu0.4", "binary_name": "cups-filters-core-drivers" }, { "binary_version": "1.27.4-1ubuntu0.4", "binary_name": "libcupsfilters-dev" }, { "binary_version": "1.27.4-1ubuntu0.4", "binary_name": "libcupsfilters1" }, { "binary_version": "1.27.4-1ubuntu0.4", "binary_name": "libfontembed-dev" }, { "binary_version": "1.27.4-1ubuntu0.4", "binary_name": "libfontembed1" } ] }
{ "cves_map": { "ecosystem": "Ubuntu:20.04:LTS", "cves": [ { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2024-47076" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2024-47176" } ] } }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.28.15-0ubuntu1.4", "binary_name": "cups-browsed" }, { "binary_version": "1.28.15-0ubuntu1.4", "binary_name": "cups-filters" }, { "binary_version": "1.28.15-0ubuntu1.4", "binary_name": "cups-filters-core-drivers" }, { "binary_version": "1.28.15-0ubuntu1.4", "binary_name": "libcupsfilters-dev" }, { "binary_version": "1.28.15-0ubuntu1.4", "binary_name": "libcupsfilters1" }, { "binary_version": "1.28.15-0ubuntu1.4", "binary_name": "libfontembed-dev" }, { "binary_version": "1.28.15-0ubuntu1.4", "binary_name": "libfontembed1" } ] }
{ "cves_map": { "ecosystem": "Ubuntu:22.04:LTS", "cves": [ { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2024-47076" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2024-47176" } ] } }