USN-6844-1: CUPS vulnerability
24 June 2024
CUPS could be made to arbitrary chmod paths with specially crafted configuration file.
Releases
Packages
- cups - Common UNIX Printing System(tm)
Details
Rory McNamara discovered that when starting the cupsd server with a
Listen configuration item, the cupsd process fails to validate if
bind call passed. An attacker could possibly trick cupsd to perform
an arbitrary chmod of the provided argument, providing world-writable
access to the target.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.04
Ubuntu 23.10
Ubuntu 22.04
Ubuntu 20.04
Ubuntu 18.04
-
cups
-
2.2.7-1ubuntu2.10+esm4
Available with Ubuntu Pro
Ubuntu 16.04
-
cups
-
2.1.3-4ubuntu0.11+esm6
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.