The Register Home Page

back to article AI agents found vulns in this popular Linux and Unix print server

In the latest chapter on leaky CUPS, a security researcher and his band of bug-hunting agents have found two flaws that can be chained to allow an unauthenticated attacker to remotely execute code and achieve root file overwrite on the network. CUPS - or the Common Unix Printing System, as it is less commonly known - is the …

  1. Sorry that handle is already taken. Silver badge
    Unhappy

    Oh no!

    The Register has begun putting "this" in headlines

    1. Clausewitz4.1
      Devil

      Re: Oh no!

      Investors must be desperate, indeed

      1. Anonymous Coward
        Anonymous Coward

        Re: Oh no!

        Well given the huge IT stories El Reg has repeated ignored over the past few weeks, it's a good thing there are other forums around.

        And it's a sad day when the BBCs coverage is broader than El Reg. Something I would not have said 3 years ago.

        Let' see if this comment get's deleted ....

        #BusinessInterests

        1. Anonymous Coward
          Anonymous Coward

          Re: Oh no!

          ... huge IT stories El Reg has repeated ignored ...

          Don't know about huge, repeated (?) or even repeatedly.

          But ignored implies willful action.

          Seriously, now.

          ElReg has been my go-to IT publication for the last 13 years or so and in my view, I do not think ignored would be the case.

          That said, I have not seen / read anything about CVE-2026-29111 and CVE-2026-3888.

          Maybe it slipped by ElReg, by me or they are not important enough to report on.

          Worst case?

          Shit happens, everywhere.

          Both at ElReg and while travelling in a tin can 406,771 km from Mother Earth.

          .

          1. Anonymous Coward
            Anonymous Coward

            Re: Oh no!

            Not a single article on the seismic story about Meta etc being found liable in CA. If you rely on El Reg that never happened.

            https://www.bbc.co.uk/news/articles/c747x7gz249o

            There have been others. How about the story about a bot that got stroppy when it's Wiki edits were pulled ?

            https://www.malwarebytes.com/blog/ai/2026/04/wikipedias-ai-agent-row-likely-just-the-beginning-of-the-bot-ocalypse

            1. kmorwath Silver badge

              Re: Oh no!

              There was also Uffizi museum in Florence p0wend thorouglhy (and shutdown - including bricking up doors) - not one of the most unknown ones in the world...

    2. Throatwarbler Mangrove Silver badge
      Angel

      Re: Oh no!

      You won't believe what comes next!

    3. This post has been deleted by its author

    4. Dan 55 Silver badge

      Re: Oh no!

      Could be worse, could be that AI agents found two weird tricks.

      1. that one in the corner Silver badge

        Re: Oh no!

        The third one will amaze you!!!

    5. b0llchit Silver badge
      Coat

      Re: Oh no!

      Yes,...What about "that"?

    6. FrogsAndChips
      Holmes

      Re: Oh no!

      Yeah, before clicking on the article I really had NO idea what "this popular Linux and Unix print server" could be...

      1. Yet Another Anonymous coward Silver badge

        Re: Oh no!

        Fake news, there is nothing 'popular' about anything to do with printers

    7. Blazde Silver badge

      Re: Oh no!

      We've also been denied the gold that could have been "2 flaws 1 CUPS"

  2. Eric 9001

    How much time was spent prompting exactly?

    I suspect that it took twice as long as looking at CUPS without proprietary software and SaaSS and finding some more of the remaining bugs.

  3. chuckufarley
    Holmes

    "This" has always been my issue with CUPS on Linux...

    ...If I don't have a printer installed why does my entire desktop depend on it? Seriously. Install any given Linux desktop and then uninstall CUPS. You will be left with a box that only runs a CLI. That's great if your last name is Torvalds but the rest of us use a hell if more than the command line.

    1. hugo tyson

      Re: "This" has always been my issue with CUPS on Linux...

      Because print-to-pdf is a feature supported by almost every application? OK, I dunno why that would need CUPS but I can see why "printing" per se is always there even if you have no hardware.

      And print to pdf is very useful, you can then mess with it and share eg. tickets to your phone via google drive. &c &c

      1. that one in the corner Silver badge

        Re: "This" has always been my issue with CUPS on Linux...

        > why that would need CUPS

        Because CUPS, with its drivers and filters installed, provides a conversion to PDF, a single path that all the desktop programs can use. They *could* all implement PDF/Postscript generation without calling CUPS but from their p.o.v. that is duplicated effort. And if you've installed all the office-style apps, having a default CUPS installed, even without a physical printer, isn't a killer overhead.

        1. Yet Another Anonymous coward Silver badge

          Re: "This" has always been my issue with CUPS on Linux...

          No but it's a big and complex system that has lots of networking, remote execution and low level driver access, is ubiquitous and has been 'in the wild' for decades which means it has to be a prime source of unknown exploits

          Just size on disk isnt the main concern if you're managing a secure environment

  4. David Pearce

    Maybe because Postscript and PDF are both languages with far more executable capability than is wise for page rendering

  5. kmorwath Silver badge

    "more likely to be used in business environments."

    Just shared printers became common in non-environment business as well, since many home routers and NAS today may run CUPS as well.

    And still, the fact it makes businesses vulnerable is not secondary - although probably many run Windows print servers (which are not without issues too).

  6. Anonymous Coward
    Anonymous Coward

    DHCP exploit..

    there's an exploit in the linux DHCP.. that no one seems to have spotted yet.

    I saw it in china, when a staff member walked in with a mobile phone, that was able to leverage the DHCP server ,take it down and then replace it with a "malicious" version

    hosted on the phone.

    haven't had time to look at it fully yet.

    1. John_Ericsson

      Re: DHCP exploit..

      How did you test it?

    2. kmorwath Silver badge

      Re: DHCP exploit..

      DHCP is not a secure protocol - and it's easy to attack - that's why switches have DHCP snooping features to block man-in-the-middle attacks (even from a phone, a DHCP server is not complex)

  7. TVU Silver badge

    "AI agents found vulns in this popular Linux and Unix print server"

    I would be more impressed if AI coding agents could actually eliminate said vulnerabilities.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon