[CLSA-2025:1758916739] Fix CVE(s): CVE-2025-58060
Type:
security
Severity:
Important
Release date:
2025-09-26 19:59:07 UTC
Description:
* SECURITY UPDATE: authentication bypass vulnerability - debian/patches/CVE-2025-58060.patch: block authentication using alternate method in scheduler/auth.c - CVE-2025-58060
Updated packages:
  • cups_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
    sha:c25bc4698b1b641753cbb9254d72ed86fe68261a
  • cups-bsd_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
    sha:7af8dfcab29502465cf8c8cc2bc8bdcc36fdae7b
  • cups-client_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
    sha:e9e50a09cce1809122be58c9263c61905a8e3be0
  • cups-common_2.2.7-1ubuntu2.10+tuxcare.els6_all.deb
    sha:999917fd776f96d999684be8640f842016e998c0
  • cups-core-drivers_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
    sha:3b7485e7c9834b20b471e285a21323f516434222
  • cups-daemon_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
    sha:b0d420ccd31f9e4bc82362b86508622d8dd7d4a6
  • cups-ipp-utils_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
    sha:e4fc356e8c722510ce811600a9b70cffd9929c2d
  • cups-ppdc_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
    sha:f31c5470c9eee1e605475bbd5cf1bc4be4a300c8
  • cups-server-common_2.2.7-1ubuntu2.10+tuxcare.els6_all.deb
    sha:5f4c620e0a4ea6cb63acd52d85fe995886a0d0b0
  • libcups2_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
    sha:dd2c0b93e568b07f1df8325511dd7c9f9fe70e4c
  • libcups2-dev_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
    sha:2793b62a6b1ec4dcef8e4ad33fe6214a23d89d03
  • libcupscgi1_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
    sha:4389680c6b156581b0d29ae13fe04bca10134d4e
  • libcupsimage2_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
    sha:f71e8e0a11cb99dde88f62d8c4d80d0efab993ca
  • libcupsimage2-dev_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
    sha:50c070e411b390fc19edc1486c637201a949ede7
  • libcupsmime1_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
    sha:571fa9e314d4280aab23be9b013332d042e8de40
  • libcupsppdc1_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
    sha:b2ffb54e311e1b857033f0a303ed0b6957c2cba3
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.