Mageia 2023-0284: cups security update
Summary
The updated packages fix security vulnerabilities:
It was discovered that CUPS incorrectly authenticated certain remote
requests. A remote attacker could possibly use this issue to obtain
recently printed documents. (CVE-2023-32360)
Due to failure in validating the length provided by an attacker-crafted
PPD PostScript document, CUPS and libppd are susceptible to a heap-based
buffer overflow and possibly code execution. (CVE-2023-4504)
References
- https://bugs.mageia.org/show_bug.cgi?id=32281
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360
- https://ubuntu.com/security/notices/USN-6361-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504
- https://ubuntu.com/security/notices/USN-6391-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360
Resolution
MGASA-2023-0284 - Updated cups packages fix security vulnerabilities
SRPMS
- 9/core/cups-2.4.6-1.1.mga9
- 8/core/cups-2.3.3op2-1.5.mga8