RHSA-2026:8814
Vulnerability from csaf_redhat - Published: 2026-04-17 17:04 - Updated: 2026-04-19 19:40A flaw was found in CUPS-Filters, including `libcupsfilters`. An attacker on the same local network, with low privileges, could exploit an out-of-bounds read/write vulnerability by submitting a specially crafted TIFF image file as a print job with specific options. This could lead to limited information disclosure and data corruption.
CWE-787 - Out-of-bounds WriteA flaw was found in CUPS, a widely used printing service on Linux and UNIX-like systems. The issue arises when authentication is configured to use a method other than Basic, but the attacker sends an HTTP request with a Basic authentication header. Due to improper validation in the cupsdAuthorize() function, the password is not checked. This vulnerability allows attackers to bypass authentication entirely, resulting in unauthorized access to administrative functions and system configuration.
A flaw was found in the CUPS printing system’s ipp_read_io() function, which handles Internet Printing Protocol (IPP) requests. When processing specially crafted printer attribute responses, improper validation can cause a null pointer dereference. This leads to a crash in libcups, potentially disrupting printing services. Since CUPS is widely deployed on Linux systems for printer discovery and management, this issue can cause denial-of-service (DoS) across multiple machines on a local network.
A flaw was found in cups. A client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable by other clients.
A flaw was found in cups-filters. This vulnerability allows an out-of-bounds write via a crafted Portable Document Format (PDF) file with a large MediaBox value.
A flaw was found in OpenPrinting CUPS. This authorization bypass vulnerability allows an unprivileged user to gain unauthorized access to restricted operations. This can be exploited by using a username that differs only in case from an authorized user during authorization checks.
A flaw was found in OpenPrinting CUPS. A remote attacker can exploit a path traversal vulnerability in the RSS notifier by manipulating the `notify-recipient-uri`. This allows writing arbitrary RSS XML data to sensitive files outside the intended directory. This can lead to a denial of service (DoS) by corrupting critical system files, such as the job cache, causing the scheduler to fail and previously queued jobs to disappear.
A flaw was found in OpenPrinting CUPS. A remote attacker could exploit a heap-based buffer overflow by sending specially crafted job attributes when building filter option strings. This could lead to a denial of service, making the printing system unavailable.
A flaw was found in OpenPrinting CUPS. An unauthorized client can exploit this vulnerability by sending a specially crafted print job to a shared PostScript queue without authentication. The server improperly handles the `page-border` value, allowing an attacker to embed and reparse malicious text as a trusted scheduler control record. This can lead to arbitrary code execution with the privileges of the 'lp' user, potentially compromising the affected system.
A flaw was found in OpenPrinting CUPS. A local unprivileged user can exploit this vulnerability by coercing the `cupsd` service to authenticate to an attacker-controlled Internet Printing Protocol (IPP) service. This allows the user to create a persistent printer queue that can overwrite arbitrary files with root privileges. Successful exploitation can lead to privilege escalation and arbitrary root command execution.
A flaw was found in CUPS, an open-source printing system. An unprivileged local user can exploit an integer underflow vulnerability by providing a negative job-password-supported Internet Printing Protocol (IPP) attribute. This manipulation causes the cupsd root process to crash, which can be repeatedly triggered to achieve a sustained Denial of Service (DoS) on the system.
A flaw was found in CUPS, an open-source printing system. This vulnerability, known as a use-after-free, occurs in the CUPS scheduler when temporary printers are automatically removed. The system fails to properly manage memory, leaving a pointer to a freed memory location. An attacker could exploit this to cause the CUPS daemon to crash, leading to a denial of service. In more severe scenarios, this could potentially allow an attacker to execute arbitrary code.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:\n\ncups:\n * cups-2.4.17-1.hum1 (aarch64, x86_64)\n * cups-client-2.4.17-1.hum1 (aarch64, x86_64)\n * cups-devel-2.4.17-1.hum1 (aarch64, x86_64)\n * cups-filesystem-2.4.17-1.hum1 (noarch)\n * cups-ipptool-2.4.17-1.hum1 (aarch64, x86_64)\n * cups-libs-2.4.17-1.hum1 (aarch64, x86_64)\n * cups-lpd-2.4.17-1.hum1 (aarch64, x86_64)\n * cups-printerapp-2.4.17-1.hum1 (aarch64, x86_64)\n * cups-2.4.17-1.hum1.src (src)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:8814",
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58364",
"url": "https://access.redhat.com/security/cve/CVE-2025-58364"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58060",
"url": "https://access.redhat.com/security/cve/CVE-2025-58060"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-64503",
"url": "https://access.redhat.com/security/cve/CVE-2025-64503"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58436",
"url": "https://access.redhat.com/security/cve/CVE-2025-58436"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-57812",
"url": "https://access.redhat.com/security/cve/CVE-2025-57812"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-39316",
"url": "https://access.redhat.com/security/cve/CVE-2026-39316"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-39314",
"url": "https://access.redhat.com/security/cve/CVE-2026-39314"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-34990",
"url": "https://access.redhat.com/security/cve/CVE-2026-34990"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-34980",
"url": "https://access.redhat.com/security/cve/CVE-2026-34980"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-34979",
"url": "https://access.redhat.com/security/cve/CVE-2026-34979"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-34978",
"url": "https://access.redhat.com/security/cve/CVE-2026-34978"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27447",
"url": "https://access.redhat.com/security/cve/CVE-2026-27447"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_8814.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-04-19T19:40:33+00:00",
"generator": {
"date": "2026-04-19T19:40:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:8814",
"initial_release_date": "2026-04-17T17:04:56+00:00",
"revision_history": [
{
"date": "2026-04-17T17:04:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-18T20:00:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-19T19:40:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-main@aarch64",
"product": {
"name": "cups-main@aarch64",
"product_id": "cups-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@2.4.17-1.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-main@src",
"product": {
"name": "cups-main@src",
"product_id": "cups-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@2.4.17-1.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-main@x86_64",
"product": {
"name": "cups-main@x86_64",
"product_id": "cups-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@2.4.17-1.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-main@noarch",
"product": {
"name": "cups-main@noarch",
"product_id": "cups-main@noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-filesystem@2.4.17-1.hum1?arch=noarch\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:cups-main@aarch64"
},
"product_reference": "cups-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-main@noarch as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:cups-main@noarch"
},
"product_reference": "cups-main@noarch",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:cups-main@src"
},
"product_reference": "cups-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:cups-main@x86_64"
},
"product_reference": "cups-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-57812",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-11-12T19:01:23.981278+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414632"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in CUPS-Filters, including `libcupsfilters`. An attacker on the same local network, with low privileges, could exploit an out-of-bounds read/write vulnerability by submitting a specially crafted TIFF image file as a print job with specific options. This could lead to limited information disclosure and data corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: CUPS-Filters: Information disclosure and data corruption via crafted TIFF image file processing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-57812"
},
{
"category": "external",
"summary": "RHBZ#2414632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414632"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-57812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57812"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-57812",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57812"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34",
"url": "https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613",
"url": "https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32",
"url": "https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa",
"url": "https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4",
"url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4"
}
],
"release_date": "2025-11-12T18:46:52.801000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "cups: CUPS-Filters: Information disclosure and data corruption via crafted TIFF image file processing"
},
{
"acknowledgments": [
{
"names": [
"Hristo Venev"
]
}
],
"cve": "CVE-2025-58060",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2025-09-02T12:06:54.304000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2392595"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in CUPS, a widely used printing service on Linux and UNIX-like systems. The issue arises when authentication is configured to use a method other than Basic, but the attacker sends an HTTP request with a Basic authentication header. Due to improper validation in the cupsdAuthorize() function, the password is not checked. This vulnerability allows attackers to bypass authentication entirely, resulting in unauthorized access to administrative functions and system configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: Authentication Bypass in CUPS Authorization Handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has assessed the severity of this vulnerability as Important, given that it enables complete authentication bypass. Exploitation requires no valid credentials and can be performed remotely in some configurations. Attackers could gain administrative privileges in CUPS, modify critical configuration files, or potentially escalate their access further depending on the system environment. The root cause is a missing authentication check when the AuthType is set to values other than Basic but a Basic authorization header is supplied.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58060"
},
{
"category": "external",
"summary": "RHBZ#2392595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58060"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58060",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58060"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq"
}
],
"release_date": "2025-09-11T13:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to a widespread installation base, or stability. It is strongly advised to apply vendor-supplied patches as soon as they are released to address this authentication bypass vulnerability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cups: Authentication Bypass in CUPS Authorization Handling"
},
{
"acknowledgments": [
{
"names": [
"SilverPlate3"
]
}
],
"cve": "CVE-2025-58364",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-09-04T09:48:55.091000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2393078"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CUPS printing system\u2019s ipp_read_io() function, which handles Internet Printing Protocol (IPP) requests. When processing specially crafted printer attribute responses, improper validation can cause a null pointer dereference. This leads to a crash in libcups, potentially disrupting printing services. Since CUPS is widely deployed on Linux systems for printer discovery and management, this issue can cause denial-of-service (DoS) across multiple machines on a local network.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has assessed the severity of this vulnerability as Moderate . The flaw can be remotely exploited within local subnets to crash CUPS services without requiring authentication or user interaction. In cases where machines expose IPP services to the internet, the vulnerability may be exploitable over the network. The root cause is improper deserialization and validation of printer attributes in the ipp_read_io() function, leading to null pointer dereference and denial-of-service.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58364"
},
{
"category": "external",
"summary": "RHBZ#2393078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393078"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58364"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4"
}
],
"release_date": "2025-09-11T13:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS"
},
{
"cve": "CVE-2025-58436",
"cwe": {
"id": "CWE-412",
"name": "Unrestricted Externally Accessible Lock"
},
"discovery_date": "2025-11-20T03:23:30.142000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416040"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in cups. A client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable \nby other clients.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: Slow client communication leads to a possible DoS attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58436"
},
{
"category": "external",
"summary": "RHBZ#2416040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416040"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58436"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58436",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58436"
}
],
"release_date": "2025-12-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: Slow client communication leads to a possible DoS attack"
},
{
"cve": "CVE-2025-64503",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-11-12T23:00:53.191864+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414705"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in cups-filters. This vulnerability allows an out-of-bounds write via a crafted Portable Document Format (PDF) file with a large MediaBox value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: cups-filters: cups-filters: Out-of-bounds write via crafted PDF MediaBox",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Enterprise Linux because a specially crafted PDF file, when processed by the `cups-filters` `pdftoraster` tool, can lead to an out-of-bounds write, potentially causing a denial of service. This affects Red Hat Enterprise Linux 7, 8, 9, and 10, as well as Fedora.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64503"
},
{
"category": "external",
"summary": "RHBZ#2414705",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414705"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64503"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/11/12/2",
"url": "http://www.openwall.com/lists/oss-security/2025/11/12/2"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620",
"url": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880",
"url": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865",
"url": "https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9",
"url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790",
"url": "https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790"
}
],
"release_date": "2025-11-12T22:04:03.750000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: cups-filters: cups-filters: Out-of-bounds write via crafted PDF MediaBox"
},
{
"cve": "CVE-2026-27447",
"cwe": {
"id": "CWE-178",
"name": "Improper Handling of Case Sensitivity"
},
"discovery_date": "2026-04-03T22:01:06.208082+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2454949"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenPrinting CUPS. This authorization bypass vulnerability allows an unprivileged user to gain unauthorized access to restricted operations. This can be exploited by using a username that differs only in case from an authorized user during authorization checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: OpenPrinting CUPS: Authorization bypass via case-insensitive username comparison",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27447"
},
{
"category": "external",
"summary": "RHBZ#2454949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2454949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27447",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27447"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27447",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27447"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/commit/88516bf6d9e34cef7a64a704b856b837f70cd220",
"url": "https://github.com/OpenPrinting/cups/commit/88516bf6d9e34cef7a64a704b856b837f70cd220"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-v987-m8hp-phj9",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-v987-m8hp-phj9"
}
],
"release_date": "2026-04-03T21:11:59.734000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: OpenPrinting CUPS: Authorization bypass via case-insensitive username comparison"
},
{
"cve": "CVE-2026-34978",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-04-03T22:01:28.950944+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2454957"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenPrinting CUPS. A remote attacker can exploit a path traversal vulnerability in the RSS notifier by manipulating the `notify-recipient-uri`. This allows writing arbitrary RSS XML data to sensitive files outside the intended directory. This can lead to a denial of service (DoS) by corrupting critical system files, such as the job cache, causing the scheduler to fail and previously queued jobs to disappear.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: OpenPrinting CUPS: Denial of Service via path traversal in RSS notifier",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34978"
},
{
"category": "external",
"summary": "RHBZ#2454957",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2454957"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34978"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34978",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34978"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-f53q-7mxp-9gcr",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-f53q-7mxp-9gcr"
}
],
"release_date": "2026-04-03T21:15:15.921000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: OpenPrinting CUPS: Denial of Service via path traversal in RSS notifier"
},
{
"cve": "CVE-2026-34979",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-04-03T22:00:55.993654+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2454946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenPrinting CUPS. A remote attacker could exploit a heap-based buffer overflow by sending specially crafted job attributes when building filter option strings. This could lead to a denial of service, making the printing system unavailable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: OpenPrinting CUPS: Denial of Service via heap-based buffer overflow in job attribute processing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34979"
},
{
"category": "external",
"summary": "RHBZ#2454946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2454946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34979"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34979",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34979"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-6qxf-7jx6-86fh",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-6qxf-7jx6-86fh"
}
],
"release_date": "2026-04-03T21:16:38.594000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: OpenPrinting CUPS: Denial of Service via heap-based buffer overflow in job attribute processing"
},
{
"cve": "CVE-2026-34980",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2026-04-03T22:01:19.551428+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2454954"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenPrinting CUPS. An unauthorized client can exploit this vulnerability by sending a specially crafted print job to a shared PostScript queue without authentication. The server improperly handles the `page-border` value, allowing an attacker to embed and reparse malicious text as a trusted scheduler control record. This can lead to arbitrary code execution with the privileges of the \u0027lp\u0027 user, potentially compromising the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: OpenPrinting CUPS: Shared PostScript queue lets anonymous Print-Job requests reach `lp` code execution over the network",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34980"
},
{
"category": "external",
"summary": "RHBZ#2454954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2454954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34980"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34980",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34980"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-4852-v58g-6cwf",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-4852-v58g-6cwf"
}
],
"release_date": "2026-04-03T21:18:09.410000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: OpenPrinting CUPS: Shared PostScript queue lets anonymous Print-Job requests reach `lp` code execution over the network"
},
{
"cve": "CVE-2026-34990",
"cwe": {
"id": "CWE-73",
"name": "External Control of File Name or Path"
},
"discovery_date": "2026-04-03T22:00:58.981799+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2454947"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenPrinting CUPS. A local unprivileged user can exploit this vulnerability by coercing the `cupsd` service to authenticate to an attacker-controlled Internet Printing Protocol (IPP) service. This allows the user to create a persistent printer queue that can overwrite arbitrary files with root privileges. Successful exploitation can lead to privilege escalation and arbitrary root command execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: OpenPrinting CUPS: Privilege escalation via arbitrary file overwrite due to coerced authentication",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34990"
},
{
"category": "external",
"summary": "RHBZ#2454947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2454947"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34990"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34990",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34990"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-c54j-2vqw-wpwp",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-c54j-2vqw-wpwp"
}
],
"release_date": "2026-04-03T21:14:09.616000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: OpenPrinting CUPS: Privilege escalation via arbitrary file overwrite due to coerced authentication"
},
{
"cve": "CVE-2026-39314",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"discovery_date": "2026-04-07T18:02:16.372079+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456107"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in CUPS, an open-source printing system. An unprivileged local user can exploit an integer underflow vulnerability by providing a negative job-password-supported Internet Printing Protocol (IPP) attribute. This manipulation causes the cupsd root process to crash, which can be repeatedly triggered to achieve a sustained Denial of Service (DoS) on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: CUPS: Denial of Service via integer underflow in IPP attribute handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This Moderate impact vulnerability in CUPS allows an unprivileged local user to trigger a denial of service by providing a specially crafted IPP attribute. This can repeatedly crash the `cupsd` root process, leading to a sustained denial of service on Red Hat Enterprise Linux systems where CUPS is enabled.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-39314"
},
{
"category": "external",
"summary": "RHBZ#2456107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456107"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-39314",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-39314"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-39314",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39314"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pp8w-2g52-7vj7",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pp8w-2g52-7vj7"
}
],
"release_date": "2026-04-07T16:59:23.808000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: CUPS: Denial of Service via integer underflow in IPP attribute handling"
},
{
"cve": "CVE-2026-39316",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2026-04-07T18:03:01.140069+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456120"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in CUPS, an open-source printing system. This vulnerability, known as a use-after-free, occurs in the CUPS scheduler when temporary printers are automatically removed. The system fails to properly manage memory, leaving a pointer to a freed memory location. An attacker could exploit this to cause the CUPS daemon to crash, leading to a denial of service. In more severe scenarios, this could potentially allow an attacker to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: CUPS: Denial of Service and potential arbitrary code execution via use-after-free vulnerability when deleting temporary printers.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This Moderate impact vulnerability in CUPS arises from a use-after-free flaw within the scheduler when temporary printers are automatically deleted. Exploitation could lead to a denial of service of the CUPS daemon, and potentially arbitrary code execution. This affects Red Hat systems running CUPS where temporary printers are configured or utilized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-39316"
},
{
"category": "external",
"summary": "RHBZ#2456120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-39316",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-39316"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-39316",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39316"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pjv5-prqp-46rg",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pjv5-prqp-46rg"
}
],
"release_date": "2026-04-07T17:00:26.801000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict network access to the CUPS daemon to only trusted hosts or localhost. This can be achieved by configuring firewall rules to block access to TCP port 631 from untrusted networks. For example, using `firewalld`:\n`sudo firewall-cmd --permanent --zone=public --remove-port=631/tcp`\n`sudo firewall-cmd --reload`\nAlternatively, configure CUPS to only listen on localhost by modifying the `Listen` directive in `/etc/cups/cupsd.conf` to `Listen localhost:631`. After modifying the configuration, the CUPS service must be restarted for changes to take effect, which may temporarily interrupt printing services:\n`sudo systemctl restart cups`",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: CUPS: Denial of Service and potential arbitrary code execution via use-after-free vulnerability when deleting temporary printers."
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.