cups vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the cups package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Arbitrary Command Injection

*
  • M
Insecure Inherited Permissions

<1:2.2.6-45.el8_6.5
  • M
Insecure Inherited Permissions

<1:2.2.6-45.el8_6.5
  • M
Insecure Inherited Permissions

<1:2.2.6-45.el8_6.5
  • M
Insecure Inherited Permissions

<1:2.2.6-51.el8_8.4
  • M
Insecure Inherited Permissions

<1:2.2.6-51.el8_8.4
  • M
Insecure Inherited Permissions

<1:2.2.6-51.el8_8.4
  • M
Insecure Inherited Permissions

<1:2.2.6-51.el8_8.4
  • M
Insecure Inherited Permissions

<1:2.2.6-60.el8_10
  • M
Use After Free

<1:2.2.6-51.el8_8.3
  • M
Out-of-Bounds

<1:2.2.6-51.el8_8.3
  • M
Use After Free

<1:2.2.6-51.el8_8.3
  • M
Out-of-Bounds

<1:2.2.6-51.el8_8.3
  • M
Use After Free

<1:2.2.6-51.el8_8.3
  • M
Out-of-Bounds

<1:2.2.6-51.el8_8.3
  • M
Use After Free

<1:2.2.6-51.el8_8.3
  • M
Out-of-Bounds

<1:2.2.6-51.el8_8.3
  • M
Use After Free

<1:2.2.6-45.el8_6.4
  • M
Out-of-Bounds

<1:2.2.6-45.el8_6.4
  • M
Use After Free

<1:2.2.6-45.el8_6.4
  • M
Out-of-Bounds

<1:2.2.6-45.el8_6.4
  • M
Use After Free

<1:2.2.6-45.el8_6.4
  • M
Out-of-Bounds

<1:2.2.6-45.el8_6.4
  • M
Use After Free

<1:2.2.6-45.el8_6.4
  • M
Out-of-Bounds

<1:2.2.6-45.el8_6.4
  • M
Heap-based Buffer Overflow

*
  • H
Information Exposure

<1:2.2.6-33.el8_2.2
  • H
Information Exposure

<1:2.2.6-51.el8_8.1
  • H
Information Exposure

<1:2.2.6-38.el8_4.2
  • H
Information Exposure

<1:2.2.6-51.el8_8.1
  • H
Information Exposure

<1:2.2.6-28.el8_1.2
  • H
Information Exposure

<1:2.2.6-45.el8_6.3
  • H
Information Exposure

<1:2.2.6-38.el8_4.2
  • H
Information Exposure

<1:2.2.6-33.el8_2.2
  • H
Information Exposure

<1:2.2.6-45.el8_6.3
  • H
Information Exposure

<1:2.2.6-45.el8_6.3
  • H
Information Exposure

<1:2.2.6-51.el8_8.1
  • H
Information Exposure

<1:2.2.6-33.el8_2.2
  • H
Information Exposure

<1:2.2.6-45.el8_6.3
  • H
Information Exposure

<1:2.2.6-38.el8_4.2
  • H
Information Exposure

<1:2.2.6-51.el8_8.1
  • H
Information Exposure

<1:2.2.6-51.el8_8.1
  • M
Use After Free

<1:2.2.6-54.el8_9
  • M
Out-of-Bounds

<1:2.2.6-54.el8_9
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-33.el8_2.1
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-33.el8_2.1
  • H
Authentication Bypass

<1:2.2.6-38.el8_4.1
  • H
Authentication Bypass

<1:2.2.6-38.el8_4.1
  • H
Authentication Bypass

<1:2.2.6-38.el8_4.1
  • H
Authentication Bypass

<1:2.2.6-33.el8_2.1
  • H
Authentication Bypass

<1:2.2.6-38.el8_4.1
  • H
Authentication Bypass

<1:2.2.6-33.el8_2.1
  • H
Authentication Bypass

<1:2.2.6-28.el8_1.1
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • H
Authentication Bypass

<1:2.2.6-45.el8_6.2
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Out-of-bounds Read

<1:2.2.6-38.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Stack-based Buffer Overflow

<1:2.2.6-33.el8
  • L
Incorrect Default Permissions

*
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8
  • M
Buffer Overflow

<1:2.2.6-40.el8