Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-64503 (GCVE-0-2025-64503)
Vulnerability from cvelistv5 – Published: 2025-11-12 22:04 – Updated: 2025-11-13 16:56- CWE-787 - Out-of-bounds Write
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| OpenPrinting | cups-filters |
Affected:
cups-filters < 1.28.18
Affected: libcupsfilters >= 2.0.0, < 2.1.2 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-12T22:05:18.618Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2025/11/12/2"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-64503",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-13T16:56:00.686424Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-13T16:56:18.053Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "cups-filters",
"vendor": "OpenPrinting",
"versions": [
{
"status": "affected",
"version": "cups-filters \u003c 1.28.18"
},
{
"status": "affected",
"version": "libcupsfilters \u003e= 2.0.0, \u003c 2.1.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large `MediaBox` value, an attacker can cause CUPS-Filter 1.x\u2019s `pdftoraster` tool to write beyond the bounds of an array. First, a PDF with a large `MediaBox` width value causes `header.cupsWidth` to become large. Next, the calculation of `bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8` overflows, resulting in a small value. Then, `lineBuf` is allocated with the small `bytesPerLine` size. Finally, `convertLineChunked` calls `writePixel8`, which attempts to write to `lineBuf` outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same `bytesPerLine` multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c59791bde568631865 contains a patch, which is incorporated into cups-filters version 1.28.18."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787: Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-12T22:04:03.750Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9"
},
{
"name": "https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865"
},
{
"name": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620"
},
{
"name": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880"
},
{
"name": "https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790"
}
],
"source": {
"advisory": "GHSA-893j-2wr2-wrh9",
"discovery": "UNKNOWN"
},
"title": "[BIGSLEEP-434615384] cups-filters 1.x: out of bounds write in pdftoraster"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-64503",
"datePublished": "2025-11-12T22:04:03.750Z",
"dateReserved": "2025-11-05T19:12:25.104Z",
"dateUpdated": "2025-11-13T16:56:18.053Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-64503",
"date": "2026-04-30",
"epss": "0.00033",
"percentile": "0.09569"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-64503\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-11-12T22:15:50.293\",\"lastModified\":\"2026-01-20T18:12:40.827\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large `MediaBox` value, an attacker can cause CUPS-Filter 1.x\u2019s `pdftoraster` tool to write beyond the bounds of an array. First, a PDF with a large `MediaBox` width value causes `header.cupsWidth` to become large. Next, the calculation of `bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8` overflows, resulting in a small value. Then, `lineBuf` is allocated with the small `bytesPerLine` size. Finally, `convertLineChunked` calls `writePixel8`, which attempts to write to `lineBuf` outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same `bytesPerLine` multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c59791bde568631865 contains a patch, which is incorporated into cups-filters version 1.28.18.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":4.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.5,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L\",\"baseScore\":3.3,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openprinting:cups-filters:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.28.18\",\"matchCriteriaId\":\"1E8D664D-AE1E-4B08-8CB0-91A43C19EE27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openprinting:libcupsfilters:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.0\",\"versionEndExcluding\":\"2.1.2\",\"matchCriteriaId\":\"D664D9C3-6C68-41D2-ADC0-A47B8003B47D\"}]}]}],\"references\":[{\"url\":\"https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Product\"]},{\"url\":\"https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Product\"]},{\"url\":\"https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Product\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/11/12/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2025/11/12/2\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-12T22:05:18.618Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-64503\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-11-13T16:56:00.686424Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-11-13T16:56:09.005Z\"}}], \"cna\": {\"title\": \"[BIGSLEEP-434615384] cups-filters 1.x: out of bounds write in pdftoraster\", \"source\": {\"advisory\": \"GHSA-893j-2wr2-wrh9\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"OpenPrinting\", \"product\": \"cups-filters\", \"versions\": [{\"status\": \"affected\", \"version\": \"cups-filters \u003c 1.28.18\"}, {\"status\": \"affected\", \"version\": \"libcupsfilters \u003e= 2.0.0, \u003c 2.1.2\"}]}], \"references\": [{\"url\": \"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9\", \"name\": \"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865\", \"name\": \"https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620\", \"name\": \"https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880\", \"name\": \"https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790\", \"name\": \"https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large `MediaBox` value, an attacker can cause CUPS-Filter 1.x\\u2019s `pdftoraster` tool to write beyond the bounds of an array. First, a PDF with a large `MediaBox` width value causes `header.cupsWidth` to become large. Next, the calculation of `bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8` overflows, resulting in a small value. Then, `lineBuf` is allocated with the small `bytesPerLine` size. Finally, `convertLineChunked` calls `writePixel8`, which attempts to write to `lineBuf` outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same `bytesPerLine` multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c59791bde568631865 contains a patch, which is incorporated into cups-filters version 1.28.18.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787: Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-11-12T22:04:03.750Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-64503\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-13T16:56:18.053Z\", \"dateReserved\": \"2025-11-05T19:12:25.104Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-11-12T22:04:03.750Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2025-64503
Vulnerability from fkie_nvd - Published: 2025-11-12 22:15 - Updated: 2026-01-20 18:123.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
| Vendor | Product | Version | |
|---|---|---|---|
| openprinting | cups-filters | * | |
| openprinting | libcupsfilters | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openprinting:cups-filters:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E8D664D-AE1E-4B08-8CB0-91A43C19EE27",
"versionEndExcluding": "1.28.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openprinting:libcupsfilters:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D664D9C3-6C68-41D2-ADC0-A47B8003B47D",
"versionEndExcluding": "2.1.2",
"versionStartIncluding": "2.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large `MediaBox` value, an attacker can cause CUPS-Filter 1.x\u2019s `pdftoraster` tool to write beyond the bounds of an array. First, a PDF with a large `MediaBox` width value causes `header.cupsWidth` to become large. Next, the calculation of `bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8` overflows, resulting in a small value. Then, `lineBuf` is allocated with the small `bytesPerLine` size. Finally, `convertLineChunked` calls `writePixel8`, which attempts to write to `lineBuf` outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same `bytesPerLine` multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c59791bde568631865 contains a patch, which is incorporated into cups-filters version 1.28.18."
}
],
"id": "CVE-2025-64503",
"lastModified": "2026-01-20T18:12:40.827",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-11-12T22:15:50.293",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Product"
],
"url": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620"
},
{
"source": "security-advisories@github.com",
"tags": [
"Product"
],
"url": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9"
},
{
"source": "security-advisories@github.com",
"tags": [
"Product"
],
"url": "https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2025/11/12/2"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
RHSA-2026:8814
Vulnerability from csaf_redhat - Published: 2026-04-17 17:04 - Updated: 2026-04-22 16:37A flaw was found in CUPS-Filters, including `libcupsfilters`. An attacker on the same local network, with low privileges, could exploit an out-of-bounds read/write vulnerability by submitting a specially crafted TIFF image file as a print job with specific options. This could lead to limited information disclosure and data corruption.
CWE-787 - Out-of-bounds WriteA flaw was found in CUPS, a widely used printing service on Linux and UNIX-like systems. The issue arises when authentication is configured to use a method other than Basic, but the attacker sends an HTTP request with a Basic authentication header. Due to improper validation in the cupsdAuthorize() function, the password is not checked. This vulnerability allows attackers to bypass authentication entirely, resulting in unauthorized access to administrative functions and system configuration.
A flaw was found in the CUPS printing system’s ipp_read_io() function, which handles Internet Printing Protocol (IPP) requests. When processing specially crafted printer attribute responses, improper validation can cause a null pointer dereference. This leads to a crash in libcups, potentially disrupting printing services. Since CUPS is widely deployed on Linux systems for printer discovery and management, this issue can cause denial-of-service (DoS) across multiple machines on a local network.
A flaw was found in cups. A client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable by other clients.
A flaw was found in cups-filters. This vulnerability allows an out-of-bounds write via a crafted Portable Document Format (PDF) file with a large MediaBox value.
A flaw was found in OpenPrinting CUPS. This authorization bypass vulnerability allows an unprivileged user to gain unauthorized access to restricted operations. This can be exploited by using a username that differs only in case from an authorized user during authorization checks.
A flaw was found in OpenPrinting CUPS. A remote attacker can exploit a path traversal vulnerability in the RSS notifier by manipulating the `notify-recipient-uri`. This allows writing arbitrary RSS XML data to sensitive files outside the intended directory. This can lead to a denial of service (DoS) by corrupting critical system files, such as the job cache, causing the scheduler to fail and previously queued jobs to disappear.
A flaw was found in OpenPrinting CUPS. A remote attacker could exploit a heap-based buffer overflow by sending specially crafted job attributes when building filter option strings. This could lead to a denial of service, making the printing system unavailable.
A flaw was found in OpenPrinting CUPS. An unauthorized client can exploit this vulnerability by sending a specially crafted print job to a shared PostScript queue without authentication. The server improperly handles the `page-border` value, allowing an attacker to embed and reparse malicious text as a trusted scheduler control record. This can lead to arbitrary code execution with the privileges of the 'lp' user, potentially compromising the affected system.
A flaw was found in OpenPrinting CUPS. A local unprivileged user can exploit this vulnerability by coercing the `cupsd` service to authenticate to an attacker-controlled Internet Printing Protocol (IPP) service. This allows the user to create a persistent printer queue that can overwrite arbitrary files with root privileges. Successful exploitation can lead to privilege escalation and arbitrary root command execution.
A flaw was found in CUPS, an open-source printing system. An unprivileged local user can exploit an integer underflow vulnerability by providing a negative job-password-supported Internet Printing Protocol (IPP) attribute. This manipulation causes the cupsd root process to crash, which can be repeatedly triggered to achieve a sustained Denial of Service (DoS) on the system.
A flaw was found in CUPS, an open-source printing system. This vulnerability, known as a use-after-free, occurs in the CUPS scheduler when temporary printers are automatically removed. The system fails to properly manage memory, leaving a pointer to a freed memory location. An attacker could exploit this to cause the CUPS daemon to crash, leading to a denial of service. In more severe scenarios, this could potentially allow an attacker to execute arbitrary code.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:\n\ncups:\n * cups-2.4.17-1.hum1 (aarch64, x86_64)\n * cups-client-2.4.17-1.hum1 (aarch64, x86_64)\n * cups-devel-2.4.17-1.hum1 (aarch64, x86_64)\n * cups-filesystem-2.4.17-1.hum1 (noarch)\n * cups-ipptool-2.4.17-1.hum1 (aarch64, x86_64)\n * cups-libs-2.4.17-1.hum1 (aarch64, x86_64)\n * cups-lpd-2.4.17-1.hum1 (aarch64, x86_64)\n * cups-printerapp-2.4.17-1.hum1 (aarch64, x86_64)\n * cups-2.4.17-1.hum1.src (src)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:8814",
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58364",
"url": "https://access.redhat.com/security/cve/CVE-2025-58364"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58060",
"url": "https://access.redhat.com/security/cve/CVE-2025-58060"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-64503",
"url": "https://access.redhat.com/security/cve/CVE-2025-64503"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58436",
"url": "https://access.redhat.com/security/cve/CVE-2025-58436"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-57812",
"url": "https://access.redhat.com/security/cve/CVE-2025-57812"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-39316",
"url": "https://access.redhat.com/security/cve/CVE-2026-39316"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-39314",
"url": "https://access.redhat.com/security/cve/CVE-2026-39314"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-34990",
"url": "https://access.redhat.com/security/cve/CVE-2026-34990"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-34980",
"url": "https://access.redhat.com/security/cve/CVE-2026-34980"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-34979",
"url": "https://access.redhat.com/security/cve/CVE-2026-34979"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-34978",
"url": "https://access.redhat.com/security/cve/CVE-2026-34978"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27447",
"url": "https://access.redhat.com/security/cve/CVE-2026-27447"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_8814.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-04-22T16:37:10+00:00",
"generator": {
"date": "2026-04-22T16:37:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:8814",
"initial_release_date": "2026-04-17T17:04:56+00:00",
"revision_history": [
{
"date": "2026-04-17T17:04:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-18T20:00:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-22T16:37:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-main@aarch64",
"product": {
"name": "cups-main@aarch64",
"product_id": "cups-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@2.4.17-1.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-main@src",
"product": {
"name": "cups-main@src",
"product_id": "cups-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@2.4.17-1.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-main@x86_64",
"product": {
"name": "cups-main@x86_64",
"product_id": "cups-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@2.4.17-1.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-main@noarch",
"product": {
"name": "cups-main@noarch",
"product_id": "cups-main@noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-filesystem@2.4.17-1.hum1?arch=noarch\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:cups-main@aarch64"
},
"product_reference": "cups-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-main@noarch as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:cups-main@noarch"
},
"product_reference": "cups-main@noarch",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:cups-main@src"
},
"product_reference": "cups-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:cups-main@x86_64"
},
"product_reference": "cups-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-57812",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-11-12T19:01:23.981278+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414632"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in CUPS-Filters, including `libcupsfilters`. An attacker on the same local network, with low privileges, could exploit an out-of-bounds read/write vulnerability by submitting a specially crafted TIFF image file as a print job with specific options. This could lead to limited information disclosure and data corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: CUPS-Filters: Information disclosure and data corruption via crafted TIFF image file processing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-57812"
},
{
"category": "external",
"summary": "RHBZ#2414632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414632"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-57812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57812"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-57812",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57812"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34",
"url": "https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613",
"url": "https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32",
"url": "https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa",
"url": "https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4",
"url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4"
}
],
"release_date": "2025-11-12T18:46:52.801000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "cups: CUPS-Filters: Information disclosure and data corruption via crafted TIFF image file processing"
},
{
"acknowledgments": [
{
"names": [
"Hristo Venev"
]
}
],
"cve": "CVE-2025-58060",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2025-09-02T12:06:54.304000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2392595"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in CUPS, a widely used printing service on Linux and UNIX-like systems. The issue arises when authentication is configured to use a method other than Basic, but the attacker sends an HTTP request with a Basic authentication header. Due to improper validation in the cupsdAuthorize() function, the password is not checked. This vulnerability allows attackers to bypass authentication entirely, resulting in unauthorized access to administrative functions and system configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: Authentication Bypass in CUPS Authorization Handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has assessed the severity of this vulnerability as Important, given that it enables complete authentication bypass. Exploitation requires no valid credentials and can be performed remotely in some configurations. Attackers could gain administrative privileges in CUPS, modify critical configuration files, or potentially escalate their access further depending on the system environment. The root cause is a missing authentication check when the AuthType is set to values other than Basic but a Basic authorization header is supplied.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58060"
},
{
"category": "external",
"summary": "RHBZ#2392595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58060"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58060",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58060"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq"
}
],
"release_date": "2025-09-11T13:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to a widespread installation base, or stability. It is strongly advised to apply vendor-supplied patches as soon as they are released to address this authentication bypass vulnerability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cups: Authentication Bypass in CUPS Authorization Handling"
},
{
"acknowledgments": [
{
"names": [
"SilverPlate3"
]
}
],
"cve": "CVE-2025-58364",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-09-04T09:48:55.091000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2393078"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CUPS printing system\u2019s ipp_read_io() function, which handles Internet Printing Protocol (IPP) requests. When processing specially crafted printer attribute responses, improper validation can cause a null pointer dereference. This leads to a crash in libcups, potentially disrupting printing services. Since CUPS is widely deployed on Linux systems for printer discovery and management, this issue can cause denial-of-service (DoS) across multiple machines on a local network.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has assessed the severity of this vulnerability as Moderate . The flaw can be remotely exploited within local subnets to crash CUPS services without requiring authentication or user interaction. In cases where machines expose IPP services to the internet, the vulnerability may be exploitable over the network. The root cause is improper deserialization and validation of printer attributes in the ipp_read_io() function, leading to null pointer dereference and denial-of-service.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58364"
},
{
"category": "external",
"summary": "RHBZ#2393078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393078"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58364"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4"
}
],
"release_date": "2025-09-11T13:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS"
},
{
"cve": "CVE-2025-58436",
"cwe": {
"id": "CWE-412",
"name": "Unrestricted Externally Accessible Lock"
},
"discovery_date": "2025-11-20T03:23:30.142000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416040"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in cups. A client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable \nby other clients.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: Slow client communication leads to a possible DoS attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58436"
},
{
"category": "external",
"summary": "RHBZ#2416040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416040"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58436"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58436",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58436"
}
],
"release_date": "2025-12-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: Slow client communication leads to a possible DoS attack"
},
{
"cve": "CVE-2025-64503",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-11-12T23:00:53.191864+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414705"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in cups-filters. This vulnerability allows an out-of-bounds write via a crafted Portable Document Format (PDF) file with a large MediaBox value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: cups-filters: cups-filters: Out-of-bounds write via crafted PDF MediaBox",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat Enterprise Linux because a specially crafted PDF file, when processed by the `cups-filters` `pdftoraster` tool, can lead to an out-of-bounds write, potentially causing a denial of service. This affects Red Hat Enterprise Linux 7, 8, 9, and 10, as well as Fedora.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-64503"
},
{
"category": "external",
"summary": "RHBZ#2414705",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414705"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-64503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-64503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64503"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/11/12/2",
"url": "http://www.openwall.com/lists/oss-security/2025/11/12/2"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620",
"url": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880",
"url": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865",
"url": "https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9",
"url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790",
"url": "https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790"
}
],
"release_date": "2025-11-12T22:04:03.750000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: cups-filters: cups-filters: Out-of-bounds write via crafted PDF MediaBox"
},
{
"cve": "CVE-2026-27447",
"cwe": {
"id": "CWE-178",
"name": "Improper Handling of Case Sensitivity"
},
"discovery_date": "2026-04-03T22:01:06.208082+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2454949"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenPrinting CUPS. This authorization bypass vulnerability allows an unprivileged user to gain unauthorized access to restricted operations. This can be exploited by using a username that differs only in case from an authorized user during authorization checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: OpenPrinting CUPS: Authorization bypass via case-insensitive username comparison",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27447"
},
{
"category": "external",
"summary": "RHBZ#2454949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2454949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27447",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27447"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27447",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27447"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/commit/88516bf6d9e34cef7a64a704b856b837f70cd220",
"url": "https://github.com/OpenPrinting/cups/commit/88516bf6d9e34cef7a64a704b856b837f70cd220"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-v987-m8hp-phj9",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-v987-m8hp-phj9"
}
],
"release_date": "2026-04-03T21:11:59.734000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: OpenPrinting CUPS: Authorization bypass via case-insensitive username comparison"
},
{
"cve": "CVE-2026-34978",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-04-03T22:01:28.950944+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2454957"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenPrinting CUPS. A remote attacker can exploit a path traversal vulnerability in the RSS notifier by manipulating the `notify-recipient-uri`. This allows writing arbitrary RSS XML data to sensitive files outside the intended directory. This can lead to a denial of service (DoS) by corrupting critical system files, such as the job cache, causing the scheduler to fail and previously queued jobs to disappear.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: OpenPrinting CUPS: Denial of Service via path traversal in RSS notifier",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34978"
},
{
"category": "external",
"summary": "RHBZ#2454957",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2454957"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34978"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34978",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34978"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-f53q-7mxp-9gcr",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-f53q-7mxp-9gcr"
}
],
"release_date": "2026-04-03T21:15:15.921000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: OpenPrinting CUPS: Denial of Service via path traversal in RSS notifier"
},
{
"cve": "CVE-2026-34979",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-04-03T22:00:55.993654+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2454946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenPrinting CUPS. A remote attacker could exploit a heap-based buffer overflow by sending specially crafted job attributes when building filter option strings. This could lead to a denial of service, making the printing system unavailable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: OpenPrinting CUPS: Denial of Service via heap-based buffer overflow in job attribute processing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34979"
},
{
"category": "external",
"summary": "RHBZ#2454946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2454946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34979"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34979",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34979"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-6qxf-7jx6-86fh",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-6qxf-7jx6-86fh"
}
],
"release_date": "2026-04-03T21:16:38.594000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: OpenPrinting CUPS: Denial of Service via heap-based buffer overflow in job attribute processing"
},
{
"cve": "CVE-2026-34980",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2026-04-03T22:01:19.551428+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2454954"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenPrinting CUPS. An unauthorized client can exploit this vulnerability by sending a specially crafted print job to a shared PostScript queue without authentication. The server improperly handles the `page-border` value, allowing an attacker to embed and reparse malicious text as a trusted scheduler control record. This can lead to arbitrary code execution with the privileges of the \u0027lp\u0027 user, potentially compromising the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: OpenPrinting CUPS: Shared PostScript queue lets anonymous Print-Job requests reach `lp` code execution over the network",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34980"
},
{
"category": "external",
"summary": "RHBZ#2454954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2454954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34980"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34980",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34980"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-4852-v58g-6cwf",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-4852-v58g-6cwf"
}
],
"release_date": "2026-04-03T21:18:09.410000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: OpenPrinting CUPS: Shared PostScript queue lets anonymous Print-Job requests reach `lp` code execution over the network"
},
{
"cve": "CVE-2026-34990",
"cwe": {
"id": "CWE-73",
"name": "External Control of File Name or Path"
},
"discovery_date": "2026-04-03T22:00:58.981799+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2454947"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenPrinting CUPS. A local unprivileged user can exploit this vulnerability by coercing the `cupsd` service to authenticate to an attacker-controlled Internet Printing Protocol (IPP) service. This allows the user to create a persistent printer queue that can overwrite arbitrary files with root privileges. Successful exploitation can lead to privilege escalation and arbitrary root command execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: OpenPrinting CUPS: Privilege escalation via arbitrary file overwrite due to coerced authentication",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34990"
},
{
"category": "external",
"summary": "RHBZ#2454947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2454947"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34990"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34990",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34990"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-c54j-2vqw-wpwp",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-c54j-2vqw-wpwp"
}
],
"release_date": "2026-04-03T21:14:09.616000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: OpenPrinting CUPS: Privilege escalation via arbitrary file overwrite due to coerced authentication"
},
{
"cve": "CVE-2026-39314",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"discovery_date": "2026-04-07T18:02:16.372079+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456107"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in CUPS, an open-source printing system. An unprivileged local user can exploit an integer underflow vulnerability by providing a negative job-password-supported Internet Printing Protocol (IPP) attribute. This manipulation causes the cupsd root process to crash, which can be repeatedly triggered to achieve a sustained Denial of Service (DoS) on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: CUPS: Denial of Service via integer underflow in IPP attribute handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This Moderate impact vulnerability in CUPS allows an unprivileged local user to trigger a denial of service by providing a specially crafted IPP attribute. This can repeatedly crash the `cupsd` root process, leading to a sustained denial of service on Red Hat Enterprise Linux systems where CUPS is enabled.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-39314"
},
{
"category": "external",
"summary": "RHBZ#2456107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456107"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-39314",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-39314"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-39314",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39314"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pp8w-2g52-7vj7",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pp8w-2g52-7vj7"
}
],
"release_date": "2026-04-07T16:59:23.808000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: CUPS: Denial of Service via integer underflow in IPP attribute handling"
},
{
"cve": "CVE-2026-39316",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2026-04-07T18:03:01.140069+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456120"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in CUPS, an open-source printing system. This vulnerability, known as a use-after-free, occurs in the CUPS scheduler when temporary printers are automatically removed. The system fails to properly manage memory, leaving a pointer to a freed memory location. An attacker could exploit this to cause the CUPS daemon to crash, leading to a denial of service. In more severe scenarios, this could potentially allow an attacker to execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cups: CUPS: Denial of Service and potential arbitrary code execution via use-after-free vulnerability when deleting temporary printers.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This Moderate impact vulnerability in CUPS arises from a use-after-free flaw within the scheduler when temporary printers are automatically deleted. Exploitation could lead to a denial of service of the CUPS daemon, and potentially arbitrary code execution. This affects Red Hat systems running CUPS where temporary printers are configured or utilized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-39316"
},
{
"category": "external",
"summary": "RHBZ#2456120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-39316",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-39316"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-39316",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39316"
},
{
"category": "external",
"summary": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pjv5-prqp-46rg",
"url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pjv5-prqp-46rg"
}
],
"release_date": "2026-04-07T17:00:26.801000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T17:04:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8814"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict network access to the CUPS daemon to only trusted hosts or localhost. This can be achieved by configuring firewall rules to block access to TCP port 631 from untrusted networks. For example, using `firewalld`:\n`sudo firewall-cmd --permanent --zone=public --remove-port=631/tcp`\n`sudo firewall-cmd --reload`\nAlternatively, configure CUPS to only listen on localhost by modifying the `Listen` directive in `/etc/cups/cupsd.conf` to `Listen localhost:631`. After modifying the configuration, the CUPS service must be restarted for changes to take effect, which may temporarily interrupt printing services:\n`sudo systemctl restart cups`",
"product_ids": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:cups-main@aarch64",
"Red Hat Hardened Images:cups-main@noarch",
"Red Hat Hardened Images:cups-main@src",
"Red Hat Hardened Images:cups-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cups: CUPS: Denial of Service and potential arbitrary code execution via use-after-free vulnerability when deleting temporary printers."
}
]
}
WID-SEC-W-2025-2598
Vulnerability from csaf_certbund - Published: 2025-11-13 23:00 - Updated: 2025-12-08 23:00| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "niedrig"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "CUPS (Common Unix Printing System) ist ein Printspooler, der es lokalen und entfernten Benutzern erm\u00f6glicht, Druckfunktionen \u00fcber das Internet Printing Protocol (IPP) zu nutzen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in CUPS (Filters) ausnutzen, um Informationen offenzulegen oder einen Denial of Service herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2598 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2598.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2598 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2598"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-jpxg-qc2c-hgv4 vom 2025-11-13",
"url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-893j-2wr2-wrh9 vom 2025-11-13",
"url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7877-1 vom 2025-11-20",
"url": "https://ubuntu.com/security/notices/USN-7877-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4158-1 vom 2025-11-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023312.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4198-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023346.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7878-2 vom 2025-11-24",
"url": "https://ubuntu.com/security/notices/USN-7878-2"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3082 vom 2025-12-08",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3082.html"
}
],
"source_lang": "en-US",
"title": "CUPS (Filters): Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-12-08T23:00:00.000+00:00",
"generator": {
"date": "2025-12-09T08:26:10.953+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2598",
"initial_release_date": "2025-11-13T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-13T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-20T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-12-08T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "cups-filters \u003c1.28.18",
"product": {
"name": "Open Source CUPS cups-filters \u003c1.28.18",
"product_id": "T048616"
}
},
{
"category": "product_version",
"name": "cups-filters 1.28.18",
"product": {
"name": "Open Source CUPS cups-filters 1.28.18",
"product_id": "T048616-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:cups:cups:cups-filters__1.28.18"
}
}
},
{
"category": "product_version_range",
"name": "libcupsfilters \u003c2.1.2",
"product": {
"name": "Open Source CUPS libcupsfilters \u003c2.1.2",
"product_id": "T048617"
}
},
{
"category": "product_version",
"name": "libcupsfilters 2.1.2",
"product": {
"name": "Open Source CUPS libcupsfilters 2.1.2",
"product_id": "T048617-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:cups:cups:libcupsfilters__2.1.2"
}
}
}
],
"category": "product_name",
"name": "CUPS"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-57812",
"product_status": {
"known_affected": [
"T048616",
"T002207",
"T000126",
"T048617",
"398363"
]
},
"release_date": "2025-11-13T23:00:00.000+00:00",
"title": "CVE-2025-57812"
},
{
"cve": "CVE-2025-64503",
"product_status": {
"known_affected": [
"T048616",
"T002207",
"T000126",
"T048617",
"398363"
]
},
"release_date": "2025-11-13T23:00:00.000+00:00",
"title": "CVE-2025-64503"
}
]
}
SUSE-SU-2025:4198-1
Vulnerability from csaf_suse - Published: 2025-11-24 11:59 - Updated: 2025-11-24 11:59| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for cups-filters",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for cups-filters fixes the following issues:\n\n- CVE-2025-64503: Fixed out-of-bounds write in pdftoraster tool (bsc#1253374)\n- CVE-2025-57812: Fixed multiple TIFF-related issues in libcupsfilters (bsc#1253373)\n- CVE-2025-64524: Fixed out-of-bounds write de to use of unvalidated length parameter in the rastertopclx filter (bsc#1253364)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4198,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4198",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4198-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4198-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254198-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4198-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023346.html"
},
{
"category": "self",
"summary": "SUSE Bug 1253364",
"url": "https://bugzilla.suse.com/1253364"
},
{
"category": "self",
"summary": "SUSE Bug 1253373",
"url": "https://bugzilla.suse.com/1253373"
},
{
"category": "self",
"summary": "SUSE Bug 1253374",
"url": "https://bugzilla.suse.com/1253374"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-57812 page",
"url": "https://www.suse.com/security/cve/CVE-2025-57812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64503 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64524/"
}
],
"title": "Security update for cups-filters",
"tracking": {
"current_release_date": "2025-11-24T11:59:54Z",
"generator": {
"date": "2025-11-24T11:59:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4198-1",
"initial_release_date": "2025-11-24T11:59:54Z",
"revision_history": [
{
"date": "2025-11-24T11:59:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cups-filters-1.0.58-19.35.1.aarch64",
"product": {
"name": "cups-filters-1.0.58-19.35.1.aarch64",
"product_id": "cups-filters-1.0.58-19.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "cups-filters-cups-browsed-1.0.58-19.35.1.aarch64",
"product": {
"name": "cups-filters-cups-browsed-1.0.58-19.35.1.aarch64",
"product_id": "cups-filters-cups-browsed-1.0.58-19.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "cups-filters-devel-1.0.58-19.35.1.aarch64",
"product": {
"name": "cups-filters-devel-1.0.58-19.35.1.aarch64",
"product_id": "cups-filters-devel-1.0.58-19.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "cups-filters-foomatic-rip-1.0.58-19.35.1.aarch64",
"product": {
"name": "cups-filters-foomatic-rip-1.0.58-19.35.1.aarch64",
"product_id": "cups-filters-foomatic-rip-1.0.58-19.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "cups-filters-ghostscript-1.0.58-19.35.1.aarch64",
"product": {
"name": "cups-filters-ghostscript-1.0.58-19.35.1.aarch64",
"product_id": "cups-filters-ghostscript-1.0.58-19.35.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-filters-1.0.58-19.35.1.i586",
"product": {
"name": "cups-filters-1.0.58-19.35.1.i586",
"product_id": "cups-filters-1.0.58-19.35.1.i586"
}
},
{
"category": "product_version",
"name": "cups-filters-cups-browsed-1.0.58-19.35.1.i586",
"product": {
"name": "cups-filters-cups-browsed-1.0.58-19.35.1.i586",
"product_id": "cups-filters-cups-browsed-1.0.58-19.35.1.i586"
}
},
{
"category": "product_version",
"name": "cups-filters-devel-1.0.58-19.35.1.i586",
"product": {
"name": "cups-filters-devel-1.0.58-19.35.1.i586",
"product_id": "cups-filters-devel-1.0.58-19.35.1.i586"
}
},
{
"category": "product_version",
"name": "cups-filters-foomatic-rip-1.0.58-19.35.1.i586",
"product": {
"name": "cups-filters-foomatic-rip-1.0.58-19.35.1.i586",
"product_id": "cups-filters-foomatic-rip-1.0.58-19.35.1.i586"
}
},
{
"category": "product_version",
"name": "cups-filters-ghostscript-1.0.58-19.35.1.i586",
"product": {
"name": "cups-filters-ghostscript-1.0.58-19.35.1.i586",
"product_id": "cups-filters-ghostscript-1.0.58-19.35.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-filters-1.0.58-19.35.1.ppc64le",
"product": {
"name": "cups-filters-1.0.58-19.35.1.ppc64le",
"product_id": "cups-filters-1.0.58-19.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cups-filters-cups-browsed-1.0.58-19.35.1.ppc64le",
"product": {
"name": "cups-filters-cups-browsed-1.0.58-19.35.1.ppc64le",
"product_id": "cups-filters-cups-browsed-1.0.58-19.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cups-filters-devel-1.0.58-19.35.1.ppc64le",
"product": {
"name": "cups-filters-devel-1.0.58-19.35.1.ppc64le",
"product_id": "cups-filters-devel-1.0.58-19.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cups-filters-foomatic-rip-1.0.58-19.35.1.ppc64le",
"product": {
"name": "cups-filters-foomatic-rip-1.0.58-19.35.1.ppc64le",
"product_id": "cups-filters-foomatic-rip-1.0.58-19.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cups-filters-ghostscript-1.0.58-19.35.1.ppc64le",
"product": {
"name": "cups-filters-ghostscript-1.0.58-19.35.1.ppc64le",
"product_id": "cups-filters-ghostscript-1.0.58-19.35.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-filters-1.0.58-19.35.1.s390",
"product": {
"name": "cups-filters-1.0.58-19.35.1.s390",
"product_id": "cups-filters-1.0.58-19.35.1.s390"
}
},
{
"category": "product_version",
"name": "cups-filters-cups-browsed-1.0.58-19.35.1.s390",
"product": {
"name": "cups-filters-cups-browsed-1.0.58-19.35.1.s390",
"product_id": "cups-filters-cups-browsed-1.0.58-19.35.1.s390"
}
},
{
"category": "product_version",
"name": "cups-filters-devel-1.0.58-19.35.1.s390",
"product": {
"name": "cups-filters-devel-1.0.58-19.35.1.s390",
"product_id": "cups-filters-devel-1.0.58-19.35.1.s390"
}
},
{
"category": "product_version",
"name": "cups-filters-foomatic-rip-1.0.58-19.35.1.s390",
"product": {
"name": "cups-filters-foomatic-rip-1.0.58-19.35.1.s390",
"product_id": "cups-filters-foomatic-rip-1.0.58-19.35.1.s390"
}
},
{
"category": "product_version",
"name": "cups-filters-ghostscript-1.0.58-19.35.1.s390",
"product": {
"name": "cups-filters-ghostscript-1.0.58-19.35.1.s390",
"product_id": "cups-filters-ghostscript-1.0.58-19.35.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-filters-1.0.58-19.35.1.s390x",
"product": {
"name": "cups-filters-1.0.58-19.35.1.s390x",
"product_id": "cups-filters-1.0.58-19.35.1.s390x"
}
},
{
"category": "product_version",
"name": "cups-filters-cups-browsed-1.0.58-19.35.1.s390x",
"product": {
"name": "cups-filters-cups-browsed-1.0.58-19.35.1.s390x",
"product_id": "cups-filters-cups-browsed-1.0.58-19.35.1.s390x"
}
},
{
"category": "product_version",
"name": "cups-filters-devel-1.0.58-19.35.1.s390x",
"product": {
"name": "cups-filters-devel-1.0.58-19.35.1.s390x",
"product_id": "cups-filters-devel-1.0.58-19.35.1.s390x"
}
},
{
"category": "product_version",
"name": "cups-filters-foomatic-rip-1.0.58-19.35.1.s390x",
"product": {
"name": "cups-filters-foomatic-rip-1.0.58-19.35.1.s390x",
"product_id": "cups-filters-foomatic-rip-1.0.58-19.35.1.s390x"
}
},
{
"category": "product_version",
"name": "cups-filters-ghostscript-1.0.58-19.35.1.s390x",
"product": {
"name": "cups-filters-ghostscript-1.0.58-19.35.1.s390x",
"product_id": "cups-filters-ghostscript-1.0.58-19.35.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-filters-1.0.58-19.35.1.x86_64",
"product": {
"name": "cups-filters-1.0.58-19.35.1.x86_64",
"product_id": "cups-filters-1.0.58-19.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "cups-filters-cups-browsed-1.0.58-19.35.1.x86_64",
"product": {
"name": "cups-filters-cups-browsed-1.0.58-19.35.1.x86_64",
"product_id": "cups-filters-cups-browsed-1.0.58-19.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "cups-filters-devel-1.0.58-19.35.1.x86_64",
"product": {
"name": "cups-filters-devel-1.0.58-19.35.1.x86_64",
"product_id": "cups-filters-devel-1.0.58-19.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "cups-filters-foomatic-rip-1.0.58-19.35.1.x86_64",
"product": {
"name": "cups-filters-foomatic-rip-1.0.58-19.35.1.x86_64",
"product_id": "cups-filters-foomatic-rip-1.0.58-19.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "cups-filters-ghostscript-1.0.58-19.35.1.x86_64",
"product": {
"name": "cups-filters-ghostscript-1.0.58-19.35.1.x86_64",
"product_id": "cups-filters-ghostscript-1.0.58-19.35.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-1.0.58-19.35.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-1.0.58-19.35.1.x86_64"
},
"product_reference": "cups-filters-1.0.58-19.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-cups-browsed-1.0.58-19.35.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-cups-browsed-1.0.58-19.35.1.x86_64"
},
"product_reference": "cups-filters-cups-browsed-1.0.58-19.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-foomatic-rip-1.0.58-19.35.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-foomatic-rip-1.0.58-19.35.1.x86_64"
},
"product_reference": "cups-filters-foomatic-rip-1.0.58-19.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-ghostscript-1.0.58-19.35.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-ghostscript-1.0.58-19.35.1.x86_64"
},
"product_reference": "cups-filters-ghostscript-1.0.58-19.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-57812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-57812"
}
],
"notes": [
{
"category": "general",
"text": "CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. In CUPS-Filters versions up to and including 1.28.17 and libscupsfilters versions 2.0.0 through 2.1.1, CUPS-Filters\u0027s `imagetoraster` filter has an out of bounds read/write vulnerability in the processing of TIFF image files. While the pixel buffer is allocated with the number of pixels times a pre-calculated bytes-per-pixel value, the function which processes these pixels is called with a size of the number of pixels times 3. When suitable inputs are passed, the bytes-per-pixel value can be set to 1 and bytes outside of the buffer bounds get processed. In order to trigger the bug, an attacker must issue a print job with a crafted TIFF file, and pass appropriate print job options to control the bytes-per-pixel value of the output format. They must choose a printer configuration under which the `imagetoraster` filter or its C-function equivalent `cfFilterImageToRaster()` gets invoked. The vulnerability exists in both CUPS-Filters 1.x and the successor library libcupsfilters (CUPS-Filters 2.x). In CUPS-Filters 2.x, the vulnerable function is `_cfImageReadTIFF() in libcupsfilters`. When this function is invoked as part of `cfFilterImageToRaster()`, the caller passes a look-up-table during whose processing the out of bounds memory access happens. In CUPS-Filters 1.x, the equivalent functions are all found in the cups-filters repository, which is not split into subprojects yet, and the vulnerable code is in `_cupsImageReadTIFF()`, which is called through `cupsImageOpen()` from the `imagetoraster` tool. A patch is available in commit b69dfacec7f176281782e2f7ac44f04bf9633cfa.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-cups-browsed-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-foomatic-rip-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-ghostscript-1.0.58-19.35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-57812",
"url": "https://www.suse.com/security/cve/CVE-2025-57812"
},
{
"category": "external",
"summary": "SUSE Bug 1253373 for CVE-2025-57812",
"url": "https://bugzilla.suse.com/1253373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-cups-browsed-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-foomatic-rip-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-ghostscript-1.0.58-19.35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-cups-browsed-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-foomatic-rip-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-ghostscript-1.0.58-19.35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-24T11:59:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-57812"
},
{
"cve": "CVE-2025-64503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64503"
}
],
"notes": [
{
"category": "general",
"text": "cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large `MediaBox` value, an attacker can cause CUPS-Filter 1.x\u0027s `pdftoraster` tool to write beyond the bounds of an array. First, a PDF with a large `MediaBox` width value causes `header.cupsWidth` to become large. Next, the calculation of `bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8` overflows, resulting in a small value. Then, `lineBuf` is allocated with the small `bytesPerLine` size. Finally, `convertLineChunked` calls `writePixel8`, which attempts to write to `lineBuf` outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same `bytesPerLine` multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c59791bde568631865 contains a patch, which is incorporated into cups-filters version 1.28.18.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-cups-browsed-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-foomatic-rip-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-ghostscript-1.0.58-19.35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64503",
"url": "https://www.suse.com/security/cve/CVE-2025-64503"
},
{
"category": "external",
"summary": "SUSE Bug 1253374 for CVE-2025-64503",
"url": "https://bugzilla.suse.com/1253374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-cups-browsed-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-foomatic-rip-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-ghostscript-1.0.58-19.35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-cups-browsed-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-foomatic-rip-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-ghostscript-1.0.58-19.35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-24T11:59:54Z",
"details": "low"
}
],
"title": "CVE-2025-64503"
},
{
"cve": "CVE-2025-64524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64524"
}
],
"notes": [
{
"category": "general",
"text": "cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In versions 2.0.1 and prior, a heap-buffer-overflow vulnerability in the rastertopclx filter causes the program to crash with a segmentation fault when processing maliciously crafted input data. This issue can be exploited to trigger memory corruption, potentially leading to arbitrary code execution. This issue has been patched via commit 956283c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-cups-browsed-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-foomatic-rip-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-ghostscript-1.0.58-19.35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64524",
"url": "https://www.suse.com/security/cve/CVE-2025-64524"
},
{
"category": "external",
"summary": "SUSE Bug 1253364 for CVE-2025-64524",
"url": "https://bugzilla.suse.com/1253364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-cups-browsed-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-foomatic-rip-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-ghostscript-1.0.58-19.35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-cups-browsed-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-foomatic-rip-1.0.58-19.35.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cups-filters-ghostscript-1.0.58-19.35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-24T11:59:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-64524"
}
]
}
SUSE-SU-2025:4158-1
Vulnerability from csaf_suse - Published: 2025-11-21 14:30 - Updated: 2025-11-21 14:30| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for cups-filters",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for cups-filters fixes the following issues:\n\n- CVE-2025-64503: Fixed out-of-bounds write in pdftoraster tool (bsc#1253374)\n- CVE-2025-57812: Fixed multiple TIFF-related issues in libcupsfilters (bsc#1253373)\n- CVE-2025-64524: Fixed out-of-bounds write de to use of unvalidated length parameter in the rastertopclx filter (bsc#1253364)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4158,SUSE-SLE-Module-Basesystem-15-SP6-2025-4158,SUSE-SLE-Module-Basesystem-15-SP7-2025-4158,openSUSE-SLE-15.6-2025-4158",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4158-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4158-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254158-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4158-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023312.html"
},
{
"category": "self",
"summary": "SUSE Bug 1253364",
"url": "https://bugzilla.suse.com/1253364"
},
{
"category": "self",
"summary": "SUSE Bug 1253373",
"url": "https://bugzilla.suse.com/1253373"
},
{
"category": "self",
"summary": "SUSE Bug 1253374",
"url": "https://bugzilla.suse.com/1253374"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-57812 page",
"url": "https://www.suse.com/security/cve/CVE-2025-57812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64503 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64524/"
}
],
"title": "Security update for cups-filters",
"tracking": {
"current_release_date": "2025-11-21T14:30:38Z",
"generator": {
"date": "2025-11-21T14:30:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4158-1",
"initial_release_date": "2025-11-21T14:30:38Z",
"revision_history": [
{
"date": "2025-11-21T14:30:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cups-filters-1.25.0-150200.3.25.1.aarch64",
"product": {
"name": "cups-filters-1.25.0-150200.3.25.1.aarch64",
"product_id": "cups-filters-1.25.0-150200.3.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"product": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"product_id": "cups-filters-devel-1.25.0-150200.3.25.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-filters-1.25.0-150200.3.25.1.i586",
"product": {
"name": "cups-filters-1.25.0-150200.3.25.1.i586",
"product_id": "cups-filters-1.25.0-150200.3.25.1.i586"
}
},
{
"category": "product_version",
"name": "cups-filters-devel-1.25.0-150200.3.25.1.i586",
"product": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.i586",
"product_id": "cups-filters-devel-1.25.0-150200.3.25.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-filters-1.25.0-150200.3.25.1.ppc64le",
"product": {
"name": "cups-filters-1.25.0-150200.3.25.1.ppc64le",
"product_id": "cups-filters-1.25.0-150200.3.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"product": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"product_id": "cups-filters-devel-1.25.0-150200.3.25.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-filters-1.25.0-150200.3.25.1.s390x",
"product": {
"name": "cups-filters-1.25.0-150200.3.25.1.s390x",
"product_id": "cups-filters-1.25.0-150200.3.25.1.s390x"
}
},
{
"category": "product_version",
"name": "cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"product": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"product_id": "cups-filters-devel-1.25.0-150200.3.25.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-filters-1.25.0-150200.3.25.1.x86_64",
"product": {
"name": "cups-filters-1.25.0-150200.3.25.1.x86_64",
"product_id": "cups-filters-1.25.0-150200.3.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"product": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"product_id": "cups-filters-devel-1.25.0-150200.3.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-1.25.0-150200.3.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.aarch64"
},
"product_reference": "cups-filters-1.25.0-150200.3.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-1.25.0-150200.3.25.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.ppc64le"
},
"product_reference": "cups-filters-1.25.0-150200.3.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-1.25.0-150200.3.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.s390x"
},
"product_reference": "cups-filters-1.25.0-150200.3.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-1.25.0-150200.3.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.x86_64"
},
"product_reference": "cups-filters-1.25.0-150200.3.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64"
},
"product_reference": "cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le"
},
"product_reference": "cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.s390x"
},
"product_reference": "cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64"
},
"product_reference": "cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-1.25.0-150200.3.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.aarch64"
},
"product_reference": "cups-filters-1.25.0-150200.3.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-1.25.0-150200.3.25.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.ppc64le"
},
"product_reference": "cups-filters-1.25.0-150200.3.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-1.25.0-150200.3.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.s390x"
},
"product_reference": "cups-filters-1.25.0-150200.3.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-1.25.0-150200.3.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.x86_64"
},
"product_reference": "cups-filters-1.25.0-150200.3.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.aarch64"
},
"product_reference": "cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le"
},
"product_reference": "cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.s390x"
},
"product_reference": "cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.x86_64"
},
"product_reference": "cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-1.25.0-150200.3.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.aarch64"
},
"product_reference": "cups-filters-1.25.0-150200.3.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-1.25.0-150200.3.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.ppc64le"
},
"product_reference": "cups-filters-1.25.0-150200.3.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-1.25.0-150200.3.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.s390x"
},
"product_reference": "cups-filters-1.25.0-150200.3.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-1.25.0-150200.3.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.x86_64"
},
"product_reference": "cups-filters-1.25.0-150200.3.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64"
},
"product_reference": "cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le"
},
"product_reference": "cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.s390x"
},
"product_reference": "cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-filters-devel-1.25.0-150200.3.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64"
},
"product_reference": "cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-57812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-57812"
}
],
"notes": [
{
"category": "general",
"text": "CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. In CUPS-Filters versions up to and including 1.28.17 and libscupsfilters versions 2.0.0 through 2.1.1, CUPS-Filters\u0027s `imagetoraster` filter has an out of bounds read/write vulnerability in the processing of TIFF image files. While the pixel buffer is allocated with the number of pixels times a pre-calculated bytes-per-pixel value, the function which processes these pixels is called with a size of the number of pixels times 3. When suitable inputs are passed, the bytes-per-pixel value can be set to 1 and bytes outside of the buffer bounds get processed. In order to trigger the bug, an attacker must issue a print job with a crafted TIFF file, and pass appropriate print job options to control the bytes-per-pixel value of the output format. They must choose a printer configuration under which the `imagetoraster` filter or its C-function equivalent `cfFilterImageToRaster()` gets invoked. The vulnerability exists in both CUPS-Filters 1.x and the successor library libcupsfilters (CUPS-Filters 2.x). In CUPS-Filters 2.x, the vulnerable function is `_cfImageReadTIFF() in libcupsfilters`. When this function is invoked as part of `cfFilterImageToRaster()`, the caller passes a look-up-table during whose processing the out of bounds memory access happens. In CUPS-Filters 1.x, the equivalent functions are all found in the cups-filters repository, which is not split into subprojects yet, and the vulnerable code is in `_cupsImageReadTIFF()`, which is called through `cupsImageOpen()` from the `imagetoraster` tool. A patch is available in commit b69dfacec7f176281782e2f7ac44f04bf9633cfa.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-57812",
"url": "https://www.suse.com/security/cve/CVE-2025-57812"
},
{
"category": "external",
"summary": "SUSE Bug 1253373 for CVE-2025-57812",
"url": "https://bugzilla.suse.com/1253373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T14:30:38Z",
"details": "moderate"
}
],
"title": "CVE-2025-57812"
},
{
"cve": "CVE-2025-64503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64503"
}
],
"notes": [
{
"category": "general",
"text": "cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large `MediaBox` value, an attacker can cause CUPS-Filter 1.x\u0027s `pdftoraster` tool to write beyond the bounds of an array. First, a PDF with a large `MediaBox` width value causes `header.cupsWidth` to become large. Next, the calculation of `bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8` overflows, resulting in a small value. Then, `lineBuf` is allocated with the small `bytesPerLine` size. Finally, `convertLineChunked` calls `writePixel8`, which attempts to write to `lineBuf` outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same `bytesPerLine` multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c59791bde568631865 contains a patch, which is incorporated into cups-filters version 1.28.18.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64503",
"url": "https://www.suse.com/security/cve/CVE-2025-64503"
},
{
"category": "external",
"summary": "SUSE Bug 1253374 for CVE-2025-64503",
"url": "https://bugzilla.suse.com/1253374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T14:30:38Z",
"details": "low"
}
],
"title": "CVE-2025-64503"
},
{
"cve": "CVE-2025-64524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64524"
}
],
"notes": [
{
"category": "general",
"text": "cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In versions 2.0.1 and prior, a heap-buffer-overflow vulnerability in the rastertopclx filter causes the program to crash with a segmentation fault when processing maliciously crafted input data. This issue can be exploited to trigger memory corruption, potentially leading to arbitrary code execution. This issue has been patched via commit 956283c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64524",
"url": "https://www.suse.com/security/cve/CVE-2025-64524"
},
{
"category": "external",
"summary": "SUSE Bug 1253364 for CVE-2025-64524",
"url": "https://bugzilla.suse.com/1253364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-1.25.0-150200.3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:cups-filters-devel-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-1.25.0-150200.3.25.1.x86_64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.aarch64",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.ppc64le",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.s390x",
"openSUSE Leap 15.6:cups-filters-devel-1.25.0-150200.3.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T14:30:38Z",
"details": "moderate"
}
],
"title": "CVE-2025-64524"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.