OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to 2.4.17, a network-adjacent attacker can send a crafted SNMP response to the CUPS SNMP backend that causes an out-of-bounds read of up to 176 bytes past a stack buffer. The leaked memory is converted from UTF-16 to UTF-8 and stored as printer supply description strings, which are subsequently visible to authenticated users via IPP Get-Printer-Attributes responses and the CUPS web interface. This vulnerability is fixed in 2.4.17.
References
Configurations
No configuration.
History
25 Apr 2026, 03:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/OpenPrinting/cups/security/advisories/GHSA-6wpw-g8g6-wvrv - |
24 Apr 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-24 17:16
Updated : 2026-04-25 03:16
NVD link : CVE-2026-41079
Mitre link : CVE-2026-41079
CVE.ORG link : CVE-2026-41079
JSON object : View
Products Affected
No product.
