DEBIAN-CVE-2026-34978

Source
https://security-tracker.debian.org/tracker/CVE-2026-34978
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34978.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-34978
Upstream
  • CVE-2026-34978
Published
2026-04-03T22:16:26.947Z
Modified
2026-05-15T05:00:57.331238Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L CVSS Calculator
Summary
[none]
Details

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, the RSS notifier allows .. path traversal in notify-recipient-uri (e.g., rss:///../job.cache), letting a remote IPP client write RSS XML bytes outside CacheDir/rss (anywhere that is lp-writable). In particular, because CacheDir is group-writable by default (typically root:lp and mode 0770), the notifier (running as lp) can replace root-managed state files via temp-file + rename(). This PoC clobbers CacheDir/job.cache with RSS XML, and after restarting cupsd the scheduler fails to parse the job cache and previously queued jobs disappear. At time of publication, there are no publicly available patches.

References

Affected packages

Debian:11 / cups

Package

Name
cups
Purl
pkg:deb/debian/cups?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.3.3op2-3+deb11u1
2.3.3op2-3+deb11u2
2.3.3op2-3+deb11u3
2.3.3op2-3+deb11u4
2.3.3op2-3+deb11u5
2.3.3op2-3+deb11u6
2.3.3op2-3+deb11u7
2.3.3op2-3+deb11u8
2.3.3op2-3+deb11u9
2.3.3op2-3+deb11u10
2.3.3op2-4
2.3.3op2-5
2.3.3op2-6
2.3.3op2-7
2.4.1op1-1
2.4.1op1-2
2.4.2-1
2.4.2-2
2.4.2-3
2.4.2-4
2.4.2-5
2.4.2-6
2.4.7-1
2.4.7-1.1
2.4.7-1.2
2.4.7-2
2.4.7-3
2.4.10-1
2.4.10-2
2.4.10-3
2.4.10-4
2.4.14-1
2.4.15-1
2.4.16-1
2.4.17-1
2.4.18-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34978.json"

Debian:12 / cups

Package

Name
cups
Purl
pkg:deb/debian/cups?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.4.2-3
2.4.2-3+deb12u1
2.4.2-3+deb12u2
2.4.2-3+deb12u3
2.4.2-3+deb12u4
2.4.2-3+deb12u5
2.4.2-3+deb12u6
2.4.2-3+deb12u7
2.4.2-3+deb12u8
2.4.2-3+deb12u9
2.4.2-4
2.4.2-5
2.4.2-6
2.4.7-1
2.4.7-1.1
2.4.7-1.2
2.4.7-2
2.4.7-3
2.4.10-1
2.4.10-2
2.4.10-3
2.4.10-4
2.4.14-1
2.4.15-1
2.4.16-1
2.4.17-1
2.4.18-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34978.json"

Debian:13 / cups

Package

Name
cups
Purl
pkg:deb/debian/cups?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.4.10-3
2.4.10-3+deb13u1
2.4.10-3+deb13u2
2.4.10-4
2.4.14-1
2.4.15-1
2.4.16-1
2.4.17-1
2.4.18-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34978.json"

Debian:14 / cups

Package

Name
cups
Purl
pkg:deb/debian/cups?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.17-1

Affected versions

2.*
2.4.10-3
2.4.10-4
2.4.14-1
2.4.15-1
2.4.16-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34978.json"