Bug 2461611 (CVE-2026-41079) - CVE-2026-41079 cups: CUPS: Information disclosure via crafted SNMP response
Summary: CVE-2026-41079 cups: CUPS: Information disclosure via crafted SNMP response
Keywords:
Status: NEW
Alias: CVE-2026-41079
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-24 18:02 UTC by OSIDB Bzimport
Modified: 2026-04-28 23:28 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-24 18:02:01 UTC
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to 2.4.17, a network-adjacent attacker can send a crafted SNMP response to the CUPS SNMP backend that causes an out-of-bounds read of up to 176 bytes past a stack buffer. The leaked memory is converted from UTF-16 to UTF-8 and stored as printer supply description strings, which are subsequently visible to authenticated users via IPP Get-Printer-Attributes responses and the CUPS web interface. This vulnerability is fixed in 2.4.17.


Note You need to log in before you can comment on or make changes to this bug.