vulnerability
Amazon Linux 2023: CVE-2025-61915: Medium priority package update for cups
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:L/Au:M/C:N/I:N/A:C) | Nov 28, 2025 | Jan 12, 2026 | Jan 12, 2026 |
Severity
4
CVSS
(AV:L/AC:L/Au:M/C:N/I:N/A:C)
Published
Nov 28, 2025
Added
Jan 12, 2026
Modified
Jan 12, 2026
Description
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a user in the lpadmin group can use the cups web ui to change the config and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write. This issue has been patched in version 2.4.15.
A flaw was found in cups. A user in group defined by SystemGroup directive in /etc/cups/cups-files.conf can use the cups web ui to change the config
and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write.
A flaw was found in cups. A user in group defined by SystemGroup directive in /etc/cups/cups-files.conf can use the cups web ui to change the config
and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write.
Solutions
amazon-linux-2023-upgrade-cupsamazon-linux-2023-upgrade-cups-clientamazon-linux-2023-upgrade-cups-client-debuginfoamazon-linux-2023-upgrade-cups-debuginfoamazon-linux-2023-upgrade-cups-debugsourceamazon-linux-2023-upgrade-cups-develamazon-linux-2023-upgrade-cups-filesystemamazon-linux-2023-upgrade-cups-ipptoolamazon-linux-2023-upgrade-cups-ipptool-debuginfoamazon-linux-2023-upgrade-cups-libsamazon-linux-2023-upgrade-cups-libs-debuginfoamazon-linux-2023-upgrade-cups-lpdamazon-linux-2023-upgrade-cups-lpd-debuginfoamazon-linux-2023-upgrade-cups-printerappamazon-linux-2023-upgrade-cups-printerapp-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.