Fedora Linux 8712 Published by

A libppd security update has been released for Fedora 38.



[SECURITY] Fedora 38 Update: libppd-2.0~rc2-4.fc38


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-00484b4120
2023-09-26 01:21:18.322480
--------------------------------------------------------------------------------

Name : libppd
Product : Fedora 38
Version : 2.0~rc2
Release : 4.fc38
URL : https://github.com/OpenPrinting/libppd
Summary : Library for retro-fitting legacy printer drivers
Description :
Libppd provides all PPD related function/API which is going
to be removed from CUPS 3.X, but are still required for retro-fitting
support of legacy printers. The library is meant only for retro-fitting
printer applications, any new printer drivers have to be written as
native printer application without libppd.

--------------------------------------------------------------------------------
Update Information:

CVE-2023-4504 libppd: Postscript Parsing Heap Overflow
--------------------------------------------------------------------------------
ChangeLog:

* Wed Sep 20 2023 Zdenek Dohnal [zdohnal@redhat.com] - 1:2.0~rc2-4
- CVE-2023-4504 libppd: Postscript Parsing Heap Overflow
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2238509 - CVE-2023-4504 cups, libppd: Postscript Parsing Heap Overflow
https://bugzilla.redhat.com/show_bug.cgi?id=2238509
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-00484b4120' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------