{"id":"CVE-2022-26691","details":"A logic issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. An application may be able to gain elevated privileges.","modified":"2026-04-10T04:46:43.788732Z","published":"2022-05-26T18:15:09.340Z","related":["CGA-8493-qc72-qh44","MGASA-2022-0392","SUSE-SU-2022:1861-1","openSUSE-SU-2024:12122-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQ6TD7F3VRITPEHFDHZHK7MU6FEBMZ5U/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQRIT4H75XV6M42K7ZTARWZ7YLLYQHPO/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00039.html"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT213183"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5149"},{"type":"ADVISORY","url":"https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0026/MNDT-2022-0026.md"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT213184"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT213185"},{"type":"FIX","url":"https://github.com/OpenPrinting/cups/commit/de4f8c196106033e4c372dce3e91b9d42b0b9444"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openprinting/cups","events":[{"introduced":"0"},{"fixed":"12ff481989924fc82ffdf1b8699753a486a33547"},{"fixed":"de4f8c196106033e4c372dce3e91b9d42b0b9444"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.4.2"}]}}],"versions":["v2.2.0","v2.2.1","v2.2.2","v2.2.3","v2.2.4","v2.2.5","v2.2.6","v2.2b1","v2.2b2","v2.2rc1","v2.3.0","v2.3.1","v2.3.3","v2.3.3op1","v2.3.3op2","v2.3b1","v2.3b2","v2.3b3","v2.3b4","v2.3b5","v2.3b6","v2.3b7","v2.3b8","v2.3rc1","v2.4.0","v2.4.1","v2.4b1","v2.4rc1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"499.4"}]},{"events":[{"introduced":"10.15"},{"fixed":"10.15.7"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-security_update_2020"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-security_update_2020\\-001"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-security_update_2020\\-005"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-security_update_2020\\-007"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-security_update_2021\\-001"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-security_update_2021\\-002"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-security_update_2021\\-003"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-security_update_2021\\-006"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-security_update_2021\\-007"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-security_update_2021\\-008"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-security_update_2022\\-001"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-security_update_2022\\-002"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-supplemental_update"}]},{"events":[{"introduced":"11.0"},{"fixed":"11.6.5"}]},{"events":[{"introduced":"0"},{"fixed":"12.3"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-26691.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}