{"id":"RLSA-2022:5056","summary":"Important: cups security and bug fix update","details":"The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.\n\nSecurity Fix(es):\n\n* cups: authorization bypass when using \"local\" authorization (CVE-2022-26691)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* 30-second delays printing to Windows 2016 server via HTTPS (BZ#2073531)","modified":"2026-02-04T21:45:08.590675Z","published":"2022-06-15T12:22:08Z","upstream":["CVE-2022-26691"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2022:5056"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2084321"}],"affected":[{"package":{"name":"cups","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/cups?distro=rocky-linux-8-6-legacy&epoch=1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.2.6-45.el8_6.2"}],"database_specific":{"yum_repository":"BaseOS"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2022:5056.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}