vulnerability

Amazon Linux 2023: CVE-2025-64524: Medium priority package update for cups-filters

Severity
7
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:C)
Published
Nov 20, 2025
Added
Dec 9, 2025
Modified
Dec 16, 2025

Description

cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In versions 2.0.1 and prior, a heap-buffer-overflow vulnerability in the rastertopclx filter causes the program to crash with a segmentation fault when processing maliciously crafted input data. This issue can be exploited to trigger memory corruption, potentially leading to arbitrary code execution. This issue has been patched via commit 956283c.
A flaw was found in cups-filters. This vulnerability allows a heap buffer overflow and memory corruption, potentially leading to arbitrary code execution or a Denial of Service, via an unvalidated length parameter in the CompressData function of the rastertopclx filter. This can be exploited by an attacker with permissions to install a printer with a PPD (PostScript Printer Description) file or remotely via the CUPS (Common Unix Printing System) web interface.

Solutions

amazon-linux-2023-upgrade-cups-filtersamazon-linux-2023-upgrade-cups-filters-debuginfoamazon-linux-2023-upgrade-cups-filters-debugsourceamazon-linux-2023-upgrade-cups-filters-develamazon-linux-2023-upgrade-cups-filters-libsamazon-linux-2023-upgrade-cups-filters-libs-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.