OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, an unsafe deserialization and validation of printer attributes causes null dereference in the libcups library. This is a remote DoS vulnerability available in local subnet in default configurations. It can cause the cups & cups-browsed to crash, on all the machines in local network who are listening for printers (so by default for all regular linux machines). On systems where the vulnerability CVE-2024-47176 (cups-filters 1.x/cups-browsed 2.x vulnerability) was not fixed, and the firewall on the machine does not reject incoming communication to IPP port, and the machine is set to be available to public internet, attack vector Network is possible. The current versions of CUPS and cups-browsed projects have the attack vector Adjacent in their default configurations. Version 2.4.13 contains a patch for CVE-2025-58364.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Cups | Openprinting | * | 2.4.13 (excluding) |
| Red Hat Enterprise Linux 10 | RedHat | cups-1:2.4.10-11.el10_0.1 | * |
| Red Hat Enterprise Linux 8 | RedHat | cups-1:2.2.6-64.el8_10 | * |
| Red Hat Enterprise Linux 8 | RedHat | cups-1:2.2.6-64.el8_10 | * |
| Red Hat Enterprise Linux 9 | RedHat | cups-1:2.3.3op2-33.el9_6.1 | * |
| Red Hat Enterprise Linux 9 | RedHat | cups-1:2.3.3op2-33.el9_6.1 | * |
| Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions | RedHat | cups-1:2.3.3op2-13.el9_0.4 | * |
| Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions | RedHat | cups-1:2.3.3op2-16.el9_2.4 | * |
| Red Hat Enterprise Linux 9.4 Extended Update Support | RedHat | cups-1:2.3.3op2-27.el9_4.1 | * |
| Cups | Ubuntu | devel | * |
| Cups | Ubuntu | esm-infra/bionic | * |
| Cups | Ubuntu | esm-infra/focal | * |
| Cups | Ubuntu | esm-infra/xenial | * |
| Cups | Ubuntu | jammy | * |
| Cups | Ubuntu | noble | * |
| Cups | Ubuntu | plucky | * |
| Cups | Ubuntu | upstream | * |
Input validation is a frequently-used technique for checking potentially dangerous inputs in order to ensure that the inputs are safe for processing within the code, or when communicating with other components. Input can consist of:
Data can be simple or structured. Structured data can be composed of many nested layers, composed of combinations of metadata and raw data, with other simple or structured data. Many properties of raw data or metadata may need to be validated upon entry into the code, such as:
Implied or derived properties of data must often be calculated or inferred by the code itself. Errors in deriving properties may be considered a contributing factor to improper input validation.