[CLSA-2026:1777022893] Fix CVE(s): CVE-2026-34980
Type:
security
Severity:
Important
Release date:
2026-04-25 08:50:58 UTC
Description:
* SECURITY UPDATE: arbitrary PPD keyword injection via job options - debian/patches/CVE-2026-34980.patch: filter control characters from option values and allowlist PPD keywords from filters in scheduler/job.c - CVE-2026-34980
Updated packages:
  • cups_2.2.7-1ubuntu2.10+tuxcare.els9_amd64.deb
    sha:3357b15e011294a724eec6734cc2bcc76f75cfc4
  • cups-bsd_2.2.7-1ubuntu2.10+tuxcare.els9_amd64.deb
    sha:5e4cc3b0200141a28f4bd16e9fa3126dec23a9e0
  • cups-client_2.2.7-1ubuntu2.10+tuxcare.els9_amd64.deb
    sha:b658607834ea195e954681515339151101585b49
  • cups-common_2.2.7-1ubuntu2.10+tuxcare.els9_all.deb
    sha:8d760e1117fe9b10e19019a064e2847332ad984b
  • cups-core-drivers_2.2.7-1ubuntu2.10+tuxcare.els9_amd64.deb
    sha:fdbc532e3a559a987baa7b85ff0101213f6896a9
  • cups-daemon_2.2.7-1ubuntu2.10+tuxcare.els9_amd64.deb
    sha:0f35ca12606aa54b1593a725724e3d817bf97458
  • cups-ipp-utils_2.2.7-1ubuntu2.10+tuxcare.els9_amd64.deb
    sha:487a4fdb871ec30a8a4c29ce9b032556d92f3e2e
  • cups-ppdc_2.2.7-1ubuntu2.10+tuxcare.els9_amd64.deb
    sha:a01ea2a8d4f54e946bdb451c31b165cd627f1ceb
  • cups-server-common_2.2.7-1ubuntu2.10+tuxcare.els9_all.deb
    sha:b30acc043bfb903d4e6802db370bd75b0f502dc0
  • libcups2_2.2.7-1ubuntu2.10+tuxcare.els9_amd64.deb
    sha:b31b89bc5a9a2e52d86eb5805a2717681b12b5d9
  • libcups2-dev_2.2.7-1ubuntu2.10+tuxcare.els9_amd64.deb
    sha:4e208f99be68088313a2748d7471b8121087ca02
  • libcupscgi1_2.2.7-1ubuntu2.10+tuxcare.els9_amd64.deb
    sha:e8222e612908736027fe71a28a2bfaef4aa1679c
  • libcupsimage2_2.2.7-1ubuntu2.10+tuxcare.els9_amd64.deb
    sha:007942f99a4bb7ec0d5b23f9ad070d692b98d0c9
  • libcupsimage2-dev_2.2.7-1ubuntu2.10+tuxcare.els9_amd64.deb
    sha:f0f4c88617ee1553a979df0ac63833565b060be7
  • libcupsmime1_2.2.7-1ubuntu2.10+tuxcare.els9_amd64.deb
    sha:c53ff8d412bf5c8de366cc10f1708697414c4a68
  • libcupsppdc1_2.2.7-1ubuntu2.10+tuxcare.els9_amd64.deb
    sha:1b63a78c22a567343514cbd289b6e627ae89da2b
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.