Multiple vulnerabilities have been found in CUPS, some of which may allow execution of arbitrary code or local privilege escalation.
|Package||net-print/cups on all architectures|
|Affected versions||< 1.4.8-r1|
|Unaffected versions||>= 1.4.8-r1|
CUPS, the Common Unix Printing System, is a full-featured print server.
Multiple vulnerabilities have been discovered in CUPS. Please review the CVE identifiers referenced below for details.
A remote attacker may be able to execute arbitrary code using specially crafted streams, IPP requests or files, or cause a Denial of Service (daemon crash or hang). A local attacker may be able to gain escalated privileges or overwrite arbitrary files. Furthermore, a remote attacker may be able to obtain sensitive information from the CUPS process or hijack a CUPS administrator authentication request.
There is no known workaround at this time.
All CUPS users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-print/cups-1.4.8-r1"
NOTE: This is a legacy GLSA. Updates for all affected architectures are available since September 03, 2011. It is likely that your system is already no longer affected by this issue.