Source: cups Version: 2.4.16-1 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for cups. CVE-2026-39314[0]: | OpenPrinting CUPS is an open source printing system for Linux and | other Unix-like operating systems. In versions 2.4.16 and prior, an | integer underflow vulnerability in _ppdCreateFromIPP() (cups/ppd- | cache.c) allows any unprivileged local user to crash the cupsd root | process by supplying a negative job-password-supported IPP | attribute. The bounds check only caps the upper bound, so a negative | value passes validation, is cast to size_t (wrapping to ~2^64), and | is used as the length argument to memset() on a 33-byte stack | buffer. This causes an immediate SIGSEGV in the cupsd root process. | Combined with systemd's Restart=on-failure, an attacker can repeat | the crash for sustained denial of service. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-39314 https://www.cve.org/CVERecord?id=CVE-2026-39314 [1] https://github.com/OpenPrinting/cups/security/advisories/GHSA-pp8w-2g52-7vj7 [2] https://github.com/OpenPrinting/cups/commit/928a86b1b794f738f0a3dc87561b2e054bff7ce4 Please adjust the affected versions in the BTS as needed. Regards, Salvatore
