vulnerability

Amazon Linux 2023: CVE-2025-61915: Medium priority package update for cups

Severity
4
CVSS
(AV:L/AC:L/Au:M/C:N/I:N/A:C)
Published
Nov 28, 2025
Added
Jan 12, 2026
Modified
Jan 12, 2026

Description

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a user in the lpadmin group can use the cups web ui to change the config and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write. This issue has been patched in version 2.4.15.
A flaw was found in cups. A user in group defined by SystemGroup directive in /etc/cups/cups-files.conf can use the cups web ui to change the config
and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write.

Solutions

amazon-linux-2023-upgrade-cupsamazon-linux-2023-upgrade-cups-clientamazon-linux-2023-upgrade-cups-client-debuginfoamazon-linux-2023-upgrade-cups-debuginfoamazon-linux-2023-upgrade-cups-debugsourceamazon-linux-2023-upgrade-cups-develamazon-linux-2023-upgrade-cups-filesystemamazon-linux-2023-upgrade-cups-ipptoolamazon-linux-2023-upgrade-cups-ipptool-debuginfoamazon-linux-2023-upgrade-cups-libsamazon-linux-2023-upgrade-cups-libs-debuginfoamazon-linux-2023-upgrade-cups-lpdamazon-linux-2023-upgrade-cups-lpd-debuginfoamazon-linux-2023-upgrade-cups-printerappamazon-linux-2023-upgrade-cups-printerapp-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.