Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4380-1 | cups-filters security update |
Ubuntu USN |
USN-7878-1 | cups-filters vulnerabilities |
Tue, 20 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openprinting cups-filters
|
|
| CPEs | cpe:2.3:a:openprinting:cups-filters:*:*:*:*:*:*:*:* cpe:2.3:a:openprinting:libcupsfilters:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Openprinting cups-filters
|
Tue, 02 Dec 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 13 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Nov 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openprinting
Openprinting libcupsfilters |
|
| Vendors & Products |
Openprinting
Openprinting libcupsfilters |
Wed, 12 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 12 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large `MediaBox` value, an attacker can cause CUPS-Filter 1.x’s `pdftoraster` tool to write beyond the bounds of an array. First, a PDF with a large `MediaBox` width value causes `header.cupsWidth` to become large. Next, the calculation of `bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8` overflows, resulting in a small value. Then, `lineBuf` is allocated with the small `bytesPerLine` size. Finally, `convertLineChunked` calls `writePixel8`, which attempts to write to `lineBuf` outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same `bytesPerLine` multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c59791bde568631865 contains a patch, which is incorporated into cups-filters version 1.28.18. | |
| Title | [BIGSLEEP-434615384] cups-filters 1.x: out of bounds write in pdftoraster | |
| Weaknesses | CWE-787 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-13T16:56:18.053Z
Reserved: 2025-11-05T19:12:25.104Z
Link: CVE-2025-64503
Updated: 2025-11-12T22:05:18.618Z
Status : Analyzed
Published: 2025-11-12T22:15:50.293
Modified: 2026-01-20T18:12:40.827
Link: CVE-2025-64503
OpenCVE Enrichment
Updated: 2025-11-13T15:50:14Z
Debian DLA
Ubuntu USN