Source: cups
Version: 2.4.16-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for cups.

CVE-2026-39314[0]:
| OpenPrinting CUPS is an open source printing system for Linux and
| other Unix-like operating systems. In versions 2.4.16 and prior, an
| integer underflow vulnerability in _ppdCreateFromIPP() (cups/ppd-
| cache.c) allows any unprivileged local user to crash the cupsd root
| process by supplying a negative job-password-supported IPP
| attribute. The bounds check only caps the upper bound, so a negative
| value passes validation, is cast to size_t (wrapping to ~2^64), and
| is used as the length argument to memset() on a 33-byte stack
| buffer. This causes an immediate SIGSEGV in the cupsd root process.
| Combined with systemd's Restart=on-failure, an attacker can repeat
| the crash for sustained denial of service.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-39314
    https://www.cve.org/CVERecord?id=CVE-2026-39314
[1] https://github.com/OpenPrinting/cups/security/advisories/GHSA-pp8w-2g52-7vj7
[2] 
https://github.com/OpenPrinting/cups/commit/928a86b1b794f738f0a3dc87561b2e054bff7ce4

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to