vulnerability
Oracle Linux: CVE-2025-61915: ELSA-2026-0312: cups security update (MODERATE) (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:L/Au:M/C:N/I:N/A:C) | Nov 28, 2025 | Jan 9, 2026 | Jan 19, 2026 |
Severity
4
CVSS
(AV:L/AC:L/Au:M/C:N/I:N/A:C)
Published
Nov 28, 2025
Added
Jan 9, 2026
Modified
Jan 19, 2026
Description
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a user in the lpadmin group can use the cups web ui to change the config and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write. This issue has been patched in version 2.4.15.
A flaw was found in cups. A user in group defined by SystemGroup directive in /etc/cups/cups-files.conf can use the cups web ui to change the config
and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write.
A flaw was found in cups. A user in group defined by SystemGroup directive in /etc/cups/cups-files.conf can use the cups web ui to change the config
and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write.
Solutions
oracle-linux-upgrade-cupsoracle-linux-upgrade-cups-clientoracle-linux-upgrade-cups-develoracle-linux-upgrade-cups-filesystemoracle-linux-upgrade-cups-ipptooloracle-linux-upgrade-cups-libsoracle-linux-upgrade-cups-lpdoracle-linux-upgrade-cups-printerapp
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.