SB2026011663 - openEuler 24.03 LTS SP1 update for cups 



SB2026011663 - openEuler 24.03 LTS SP1 update for cups

Published: January 16, 2026

Security Bulletin ID SB2026011663
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Resource exhaustion (CVE-ID: CVE-2025-58436)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources when handling delays. A local user can send slow messages to cupsd with a delay of 1 byte per second, causing the daemon to consume excessive resources. 


2) Out-of-bounds write (CVE-ID: CVE-2025-61915)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when parsing IPv6 address within the get_addr_and_mask() function. A local user in the lpadmin group can use the cups web UI to change the configuration and crash the daemon. 


Remediation

Install update from vendor's website.