{"schema_version":"1.7.2","id":"OESA-2026-1930","modified":"2026-04-17T13:00:38Z","published":"2026-04-17T13:00:38Z","upstream":["CVE-2026-39314","CVE-2026-39316"],"summary":"cups security update","details":"CUPS is the standards-based, open source printing system developed by Apple Inc. for UNIX®-like operating systems. CUPS uses the Internet Printing Protocol (IPP) to support printing to local and network printers.\r\n\r\nSecurity Fix(es):\n\nOpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, an integer underflow vulnerability in _ppdCreateFromIPP() (cups/ppd-cache.c) allows any unprivileged local user to crash the cupsd root process by supplying a negative job-password-supported IPP attribute. The bounds check only caps the upper bound, so a negative value passes validation, is cast to size_t (wrapping to ~2^64), and is used as the length argument to memset() on a 33-byte stack buffer. This causes an immediate SIGSEGV in the cupsd root process. Combined with systemd&apos;s Restart=on-failure, an attacker can repeat the crash for sustained denial of service.(CVE-2026-39314)\n\nOpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a use-after-free vulnerability exists in the CUPS scheduler (cupsd) when temporary printers are automatically deleted. cupsdDeleteTemporaryPrinters() in scheduler/printers.c calls cupsdDeletePrinter() without first expiring subscriptions that reference the printer, leaving cupsd_subscription_t.dest as a dangling pointer to freed heap memory. The dangling pointer is subsequently dereferenced at multiple code sites, causing a crash (denial of service) of the cupsd daemon. With heap grooming, this can be leveraged for code execution.(CVE-2026-39316)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"cups","purl":"pkg:rpm/openEuler/cups&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.7-12.oe2403"}]}],"ecosystem_specific":{"aarch64":["cups-2.4.7-12.oe2403.aarch64.rpm","cups-client-2.4.7-12.oe2403.aarch64.rpm","cups-debuginfo-2.4.7-12.oe2403.aarch64.rpm","cups-debugsource-2.4.7-12.oe2403.aarch64.rpm","cups-devel-2.4.7-12.oe2403.aarch64.rpm","cups-ipptool-2.4.7-12.oe2403.aarch64.rpm","cups-libs-2.4.7-12.oe2403.aarch64.rpm","cups-lpd-2.4.7-12.oe2403.aarch64.rpm","cups-printerapp-2.4.7-12.oe2403.aarch64.rpm"],"noarch":["cups-filesystem-2.4.7-12.oe2403.noarch.rpm","cups-help-2.4.7-12.oe2403.noarch.rpm"],"src":["cups-2.4.7-12.oe2403.src.rpm"],"x86_64":["cups-2.4.7-12.oe2403.x86_64.rpm","cups-client-2.4.7-12.oe2403.x86_64.rpm","cups-debuginfo-2.4.7-12.oe2403.x86_64.rpm","cups-debugsource-2.4.7-12.oe2403.x86_64.rpm","cups-devel-2.4.7-12.oe2403.x86_64.rpm","cups-ipptool-2.4.7-12.oe2403.x86_64.rpm","cups-libs-2.4.7-12.oe2403.x86_64.rpm","cups-lpd-2.4.7-12.oe2403.x86_64.rpm","cups-printerapp-2.4.7-12.oe2403.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1930"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-39314"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-39316"}],"database_specific":{"severity":"Medium"}}
