vulnerability
Amazon Linux 2023: CVE-2025-58364: Medium priority package update for cups
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:A/AC:L/Au:N/C:N/I:N/A:C) | Sep 11, 2025 | Sep 30, 2025 | Sep 30, 2025 |
Severity
6
CVSS
(AV:A/AC:L/Au:N/C:N/I:N/A:C)
Published
Sep 11, 2025
Added
Sep 30, 2025
Modified
Sep 30, 2025
Description
A flaw was found in the CUPS printing system’s ipp_read_io() function, which handles Internet Printing Protocol (IPP) requests. When processing specially crafted printer attribute responses, improper validation can cause a null pointer dereference. This leads to a crash in libcups, potentially disrupting printing services. Since CUPS is widely deployed on Linux systems for printer discovery and management, this issue can cause denial-of-service (DoS) across multiple machines on a local network.
Solutions
amazon-linux-2023-upgrade-cupsamazon-linux-2023-upgrade-cups-clientamazon-linux-2023-upgrade-cups-client-debuginfoamazon-linux-2023-upgrade-cups-debuginfoamazon-linux-2023-upgrade-cups-debugsourceamazon-linux-2023-upgrade-cups-develamazon-linux-2023-upgrade-cups-filesystemamazon-linux-2023-upgrade-cups-ipptoolamazon-linux-2023-upgrade-cups-ipptool-debuginfoamazon-linux-2023-upgrade-cups-libsamazon-linux-2023-upgrade-cups-libs-debuginfoamazon-linux-2023-upgrade-cups-lpdamazon-linux-2023-upgrade-cups-lpd-debuginfoamazon-linux-2023-upgrade-cups-printerappamazon-linux-2023-upgrade-cups-printerapp-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.