CVE-2023-4504

NameCVE-2023-4504
DescriptionDue to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3594-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cups (PTS)buster2.2.10-6+deb10u6vulnerable
buster (security)2.2.10-6+deb10u9fixed
bullseye2.3.3op2-3+deb11u6fixed
bullseye (security)2.3.3op2-3+deb11u2vulnerable
bookworm2.4.2-3+deb12u5fixed
trixie2.4.7-1fixed
sid2.4.7-1.2fixed
libppd (PTS)buster, bullseye2:0.10-7.3fixed
bookworm2:0.10-9fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cupssourcebuster2.2.10-6+deb10u9DLA-3594-1
cupssourcebullseye2.3.3op2-3+deb11u4
cupssourcebookworm2.4.2-3+deb12u2
cupssource(unstable)2.4.2-6
libppdsource(unstable)(not affected)

Notes

- libppd <not-affected> (Vulnerable code introduced later)
https://www.openwall.com/lists/oss-security/2023/09/20/3
https://takeonme.org/cves/CVE-2023-4504.html
Fixed by: https://github.com/OpenPrinting/cups/commit/2431caddb7e6a87f04ac90b5c6366ad268b6ff31 (v2.4.7)
Introduced after: https://github.com/OpenPrinting/libppd/commit/fae71641faa2d778e79245b788a90c0cd5d2cb4b (2.0b1)
Fixed by: https://github.com/OpenPrinting/libppd/commit/262c909ac5b8676d1c221584c5a760e5e83fae66

Search for package or bug name: Reporting problems