Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <b669fa9d-6dce-42ad-967f-167ed6cc0a59@redhat.com>
Date: Fri, 17 Apr 2026 15:08:53 +0200
From: Zdenek Dohnal <zdohnal@...hat.com>
To: oss-security@...ts.openwall.com
Subject: cups: 8 various moderate vulnerabilities

Hi all,

we had several security reports in CUPS which are fixed in the released 
CUPS 2.4.17:

- no known CVE yet, requested from Github - 
https://github.com/OpenPrinting/cups/security/advisories/GHSA-6wpw-g8g6-wvrv 
- Heap out-of-bounds read in SNMP supply-level polling leaks stack 
memory to authenticated users - moderate severity

- CVE-2026-39314 - 
https://github.com/OpenPrinting/cups/security/advisories/GHSA-pp8w-2g52-7vj7 
- Integer underflow in `_ppdCreateFromIPP` causes root cupsd crash via 
negative `job-password-supported` - moderate severity

- CVE-2026-39316 - 
https://github.com/OpenPrinting/cups/security/advisories/GHSA-pjv5-prqp-46rg 
- Use-after-free in `cupsdDeleteTemporaryPrinters` via dangling 
subscription pointer - moderate severity

- CVE-2026-34990 - 
https://github.com/OpenPrinting/cups/security/advisories/GHSA-c54j-2vqw-wpwp 
- Local print admin token disclosure using temporary printers - moderate 
severity

- CVE-2026-34980 - 
https://github.com/OpenPrinting/cups/security/advisories/GHSA-4852-v58g-6cwf 
- Shared PostScript queue lets anonymous Print-Job requests reach `lp` 
code execution over the network - moderate severity

- CVE-2026-34979 - 
https://github.com/OpenPrinting/cups/security/advisories/GHSA-6qxf-7jx6-86fh 
- Heap overflow in `get_options()` - moderate severity

- CVE-2026-34978 - 
https://github.com/OpenPrinting/cups/security/advisories/GHSA-f53q-7mxp-9gcr 
- Path traversal in RSS notify-recipient-uri enables file write outside 
CacheDir/rss (and clobbering of job.cache) - moderate severity

- CVE-2026-27447 - 
https://github.com/OpenPrinting/cups/security/advisories/GHSA-v987-m8hp-phj9 
- Authorization bypass via case-insensitive group-member lookup - 
moderate severity

We thank all the researchers for the reports!

Have a nice day,


Zdenek


P.S. I hope you don't mind such bulk email - it was a number of CVEs at 
the same time, but all relevant information are at the links.

-- 
Zdenek Dohnal
Senior Software Engineer
Red Hat, BRQ-TPBC

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.