Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4380-1 | cups-filters security update |
Ubuntu USN |
USN-7878-1 | cups-filters vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 21 Jan 2026 03:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openprinting cups-filters
|
|
| CPEs | cpe:2.3:a:openprinting:cups-filters:*:*:*:*:*:*:*:* cpe:2.3:a:openprinting:libcupsfilters:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Openprinting cups-filters
|
Tue, 02 Dec 2025 09:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 14 Nov 2025 02:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 14 Nov 2025 01:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openprinting
Openprinting libcupsfilters |
|
| Vendors & Products |
Openprinting
Openprinting libcupsfilters |
Thu, 13 Nov 2025 07:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Nov 2025 07:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large `MediaBox` value, an attacker can cause CUPS-Filter 1.x’s `pdftoraster` tool to write beyond the bounds of an array. First, a PDF with a large `MediaBox` width value causes `header.cupsWidth` to become large. Next, the calculation of `bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8` overflows, resulting in a small value. Then, `lineBuf` is allocated with the small `bytesPerLine` size. Finally, `convertLineChunked` calls `writePixel8`, which attempts to write to `lineBuf` outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same `bytesPerLine` multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c59791bde568631865 contains a patch, which is incorporated into cups-filters version 1.28.18. | |
| Title | [BIGSLEEP-434615384] cups-filters 1.x: out of bounds write in pdftoraster | |
| Weaknesses | CWE-787 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-13T16:56:18.053Z
Reserved: 2025-11-05T19:12:25.104Z
Link: CVE-2025-64503
Updated: 2025-11-12T22:05:18.618Z
Status : Analyzed
Published: 2025-11-12T22:15:50.293
Modified: 2026-01-20T18:12:40.827
Link: CVE-2025-64503
OpenCVE Enrichment
Updated: 2025-11-14T00:50:14Z
Debian DLA
Ubuntu USN