{"id":"USN-7043-4","summary":"cups-filters vulnerabilities","details":"USN-7043-1 fixed vulnerabilities in cups-filters. This update improves the\nfix for CVE-2024-47176 by removing support for the legacy CUPS printer\ndiscovery protocol entirely.\n\nOriginal advisory details:\n\n Simone Margaritelli discovered that the cups-filters cups-browsed\n component could be used to create arbitrary printers from outside the\n local network. In combination with issues in other printing components, a\n remote attacker could possibly use this issue to connect to a system,\n created manipulated PPD files, and execute arbitrary code when a printer\n is used. This update disables support for the legacy CUPS printer\n discovery protocol. (CVE-2024-47176)\n \n Simone Margaritelli discovered that cups-filters incorrectly sanitized IPP\n data when creating PPD files. A remote attacker could possibly use this\n issue to manipulate PPD files and execute arbitrary code when a printer is\n used. (CVE-2024-47076)\n","modified":"2026-04-22T10:51:59.053112Z","published":"2024-10-09T12:00:34Z","related":["UBUNTU-CVE-2024-47076","UBUNTU-CVE-2024-47176"],"upstream":["CVE-2024-47076","CVE-2024-47176","UBUNTU-CVE-2024-47076","UBUNTU-CVE-2024-47176"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7043-4"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-47076"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-47176"}],"affected":[{"package":{"name":"cups-filters","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/cups-filters@1.27.4-1ubuntu0.4?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.27.4-1ubuntu0.4"}]}],"versions":["1.25.11-0ubuntu1","1.25.11-1","1.25.12-1","1.25.13-1","1.26.0-1","1.26.1-1","1.26.2-1","1.27.0-1","1.27.0-2","1.27.1-1","1.27.1-2","1.27.1-3","1.27.2-1","1.27.3-1","1.27.4-1","1.27.4-1ubuntu0.2","1.27.4-1ubuntu0.3"],"ecosystem_specific":{"binaries":[{"binary_name":"cups-browsed","binary_version":"1.27.4-1ubuntu0.4"},{"binary_name":"cups-filters","binary_version":"1.27.4-1ubuntu0.4"},{"binary_name":"cups-filters-core-drivers","binary_version":"1.27.4-1ubuntu0.4"},{"binary_name":"libcupsfilters1","binary_version":"1.27.4-1ubuntu0.4"},{"binary_name":"libfontembed1","binary_version":"1.27.4-1ubuntu0.4"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7043-4.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-47076"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-47176"}]}}},{"package":{"name":"cups-filters","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/cups-filters@1.28.15-0ubuntu1.4?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.28.15-0ubuntu1.4"}]}],"versions":["1.28.10-2","1.28.11-1","1.28.11-2","1.28.12-1","1.28.13-0ubuntu1","1.28.14-1","1.28.15-0ubuntu1","1.28.15-0ubuntu1.2","1.28.15-0ubuntu1.3"],"ecosystem_specific":{"binaries":[{"binary_name":"cups-browsed","binary_version":"1.28.15-0ubuntu1.4"},{"binary_name":"cups-filters","binary_version":"1.28.15-0ubuntu1.4"},{"binary_name":"cups-filters-core-drivers","binary_version":"1.28.15-0ubuntu1.4"},{"binary_name":"libcupsfilters1","binary_version":"1.28.15-0ubuntu1.4"},{"binary_name":"libfontembed1","binary_version":"1.28.15-0ubuntu1.4"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7043-4.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-47076"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-47176"}]}}}],"schema_version":"1.7.5"}