Libppd Openprinting Libppd

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Openprinting Libppd.

By the Year

In 2026 there have been 0 vulnerabilities in Openprinting Libppd. Libppd did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 1 8.60
2023 1 7.00

It may take a day or so for new Libppd vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Openprinting Libppd Security Vulnerabilities

CUPS libppd IPP Sanitization Bug Enables Remote Code Exec
CVE-2024-47175 8.6 - High - September 26, 2024

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

Improper Input Validation

CUPS: Heap BOF in libppd via PPD length validation (fixed in 2.4.7)
CVE-2023-4504 7 - High - September 21, 2023

Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.

Heap-based Buffer Overflow

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Openprinting Libppd or by Openprinting? Click the Watch button to subscribe.

subscribe