cups-2.3.3op2-33.el9_6.1
エラータID: AXSA:2025-10850:07
The Common UNIX Printing System (CUPS) provides a portable printing layer for
Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS
(CVE-2025-58364)
* cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
CVE-2025-58060
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, when the `AuthType` is set to anything but `Basic`, if the request contains an `Authorization: Basic ...` header, the password is not checked. This results in authentication bypass. Any configuration that allows an `AuthType` that is not `Basic` is affected. Version 2.4.13 fixes the issue.
CVE-2025-58364
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, an unsafe deserialization and validation of printer attributes causes null dereference in the libcups library. This is a remote DoS vulnerability available in local subnet in default configurations. It can cause the cups & cups-browsed to crash, on all the machines in local network who are listening for printers (so by default for all regular linux machines). On systems where the vulnerability CVE-2024-47176 (cups-filters 1.x/cups-browsed 2.x vulnerability) was not fixed, and the firewall on the machine does not reject incoming communication to IPP port, and the machine is set to be available to public internet, attack vector "Network" is possible. The current versions of CUPS and cups-browsed projects have the attack vector "Adjacent" in their default configurations. Version 2.4.13 contains a patch for CVE-2025-58364.
Update packages.
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, when the `AuthType` is set to anything but `Basic`, if the request contains an `Authorization: Basic ...` header, the password is not checked. This results in authentication bypass. Any configuration that allows an `AuthType` that is not `Basic` is affected. Version 2.4.13 fixes the issue.
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, an unsafe deserialization and validation of printer attributes causes null dereference in the libcups library. This is a remote DoS vulnerability available in local subnet in default configurations. It can cause the cups & cups-browsed to crash, on all the machines in local network who are listening for printers (so by default for all regular linux machines). On systems where the vulnerability CVE-2024-47176 (cups-filters 1.x/cups-browsed 2.x vulnerability) was not fixed, and the firewall on the machine does not reject incoming communication to IPP port, and the machine is set to be available to public internet, attack vector "Network" is possible. The current versions of CUPS and cups-browsed projects have the attack vector "Adjacent" in their default configurations. Version 2.4.13 contains a patch for CVE-2025-58364.
N/A
SRPMS
- cups-2.3.3op2-33.el9_6.1.src.rpm
MD5: c3fbafe984e7c59b128dd69909af4d77
SHA-256: 95ada4611eb75d987551583591c84c5247c25b7f1ffcccd282f260d4fe8065a7
Size: 7.75 MB
Asianux Server 9 for x86_64
- cups-2.3.3op2-33.el9_6.1.x86_64.rpm
MD5: 47cd9ea93d45604ca01c2988a0498562
SHA-256: d493bf30a30b5bc1cb3ff8fe1a14344ba1e77771bf0be503d19457f5f118609e
Size: 1.48 MB - cups-client-2.3.3op2-33.el9_6.1.x86_64.rpm
MD5: d1fa6ce9f3d00f22ca0805624b4efd54
SHA-256: 6730078e72f76374ed3861336e45695816d16dfcfa5beeca5ceeca9de541cded
Size: 72.98 kB - cups-devel-2.3.3op2-33.el9_6.1.i686.rpm
MD5: e1e8844cf84f6a4750e9ea37b00da2b7
SHA-256: 93f83ae3817660da865f273d32fe0c04b16f2771dd89370f6b802091ba2c79e3
Size: 52.73 kB - cups-devel-2.3.3op2-33.el9_6.1.x86_64.rpm
MD5: 5bb58b59d3168ab3fc70d9b5ac082687
SHA-256: c1b1aac33bdf1d8e0d1959a7f2ad5a34223ace60f3e05fe25d7d054efee84115
Size: 52.74 kB - cups-filesystem-2.3.3op2-33.el9_6.1.noarch.rpm
MD5: 415eff66bd9efb40d8622c864afdf80e
SHA-256: 7f5833763d3f9b32ddf492293f807527f809d6c2b8df3930010e9769edd17891
Size: 9.54 kB - cups-ipptool-2.3.3op2-33.el9_6.1.x86_64.rpm
MD5: 7c73216d3bde194013b71d1823ba65b9
SHA-256: 58f6a34e5e908d6dd57bab3a9d515875f0882dc022121a821ee5dca3332d6dfc
Size: 3.87 MB - cups-libs-2.3.3op2-33.el9_6.1.i686.rpm
MD5: 88a1f6f14a1c3f7bac2354e31008f779
SHA-256: 4c52f44f96d64d5c95446c48d3e71be89a2bc5e3ff183e79b23ebb05bb3a1b12
Size: 278.91 kB - cups-libs-2.3.3op2-33.el9_6.1.x86_64.rpm
MD5: 4fb3ae91f99c5d17dcfb17e8d0aa971f
SHA-256: 9b8d6c48509ccb699c3727370b5dfadddbe710be7b4e3a77f4f3b1c2a63fae38
Size: 260.54 kB - cups-lpd-2.3.3op2-33.el9_6.1.x86_64.rpm
MD5: 04feabd9b761763280bd7f045718732a
SHA-256: fc3c30ebfd016d7e9b0f71daf80ea50bf09fbd2d8f2854b7a9588dcfc1fd08e6
Size: 24.47 kB - cups-printerapp-2.3.3op2-33.el9_6.1.x86_64.rpm
MD5: 467c6a07387353bf74f6f10700a1829b
SHA-256: fcbb2ef4e6eca04a7e9cd476d96b467e283ad7e70f81073adb3047609bdbffe9
Size: 114.01 kB