CVE-2019-2180

NameCVE-2019-2180
DescriptionIn ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the printer service with no additional execution privileges needed. User interaction is not needed for exploitation.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1893-1, ELA-155-1
Debian Bugs934957

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cups (PTS)jessie, jessie (lts)1.7.5-11+deb8u12fixed
stretch (security)2.2.1-8+deb9u8fixed
stretch (lts), stretch2.2.1-8+deb9u12fixed
buster, buster (lts)2.2.10-6+deb10u11fixed
buster (security)2.2.10-6+deb10u10fixed
bullseye2.3.3op2-3+deb11u8fixed
bullseye (security)2.3.3op2-3+deb11u9fixed
bookworm2.4.2-3+deb12u7fixed
bookworm (security)2.4.2-3+deb12u8fixed
sid, trixie2.4.10-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cupssourcewheezy1.5.3-5+deb7u10ELA-155-1
cupssourcejessie1.7.5-11+deb8u5DLA-1893-1
cupssourcestretch2.2.1-8+deb9u4
cupssourcebuster2.2.10-6+deb10u1
cupssource(unstable)2.2.12-1934957

Notes

Covers the "Fixed IPP buffer overflow (rdar://50035411)" angle of
https://github.com/apple/cups/commit/f24e6cf6a39300ad0c3726a41a4aab51ad54c109

Search for package or bug name: Reporting problems