OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a user in the lpadmin group can use the cups web ui to change the config and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write. This issue has been patched in version 2.4.15.
References
| Link | Resource |
|---|---|
| https://github.com/OpenPrinting/cups/commit/db8d560262c22a21ee1e55dfd62fa98d9359bcb0 | Patch |
| https://github.com/OpenPrinting/cups/releases/tag/v2.4.15 | Release Notes |
| https://github.com/OpenPrinting/cups/security/advisories/GHSA-hxm8-vfpq-jrfc | Exploit Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2025/11/27/5 | Mailing List Third Party Advisory |
| https://github.com/OpenPrinting/cups/security/advisories/GHSA-hxm8-vfpq-jrfc | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-29 03:15
Updated : 2025-12-04 17:15
NVD link : CVE-2025-61915
Mitre link : CVE-2025-61915
CVE.ORG link : CVE-2025-61915
JSON object : View
Products Affected
openprinting
- cups
opengroup
- unix
