Home

Description

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to 2.4.17, a network-adjacent attacker can send a crafted SNMP response to the CUPS SNMP backend that causes an out-of-bounds read of up to 176 bytes past a stack buffer. The leaked memory is converted from UTF-16 to UTF-8 and stored as printer supply description strings, which are subsequently visible to authenticated users via IPP Get-Printer-Attributes responses and the CUPS web interface. This vulnerability is fixed in 2.4.17.

PUBLISHED Reserved 2026-04-16 | Published 2026-04-24 | Updated 2026-04-25 | Assigner GitHub_M




MEDIUM: 4.3CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-125: Out-of-bounds Read

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

< 2.4.17
affected

References

github.com/...g/cups/security/advisories/GHSA-6wpw-g8g6-wvrv exploit

github.com/...g/cups/security/advisories/GHSA-6wpw-g8g6-wvrv

github.com/...ommit/b7c2525a885f528d243c3a92197ca99609b3f080

github.com/...ommit/d7fe0f521ff3b24676511e747b058362b9a20737

cve.org (CVE-2026-41079)

nvd.nist.gov (CVE-2026-41079)

Download JSON