Release date:
2025-09-26 19:59:07 UTC
Description:
* SECURITY UPDATE: authentication bypass vulnerability
- debian/patches/CVE-2025-58060.patch: block authentication
using alternate method in scheduler/auth.c
- CVE-2025-58060
Updated packages:
-
cups_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
sha:c25bc4698b1b641753cbb9254d72ed86fe68261a
-
cups-bsd_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
sha:7af8dfcab29502465cf8c8cc2bc8bdcc36fdae7b
-
cups-client_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
sha:e9e50a09cce1809122be58c9263c61905a8e3be0
-
cups-common_2.2.7-1ubuntu2.10+tuxcare.els6_all.deb
sha:999917fd776f96d999684be8640f842016e998c0
-
cups-core-drivers_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
sha:3b7485e7c9834b20b471e285a21323f516434222
-
cups-daemon_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
sha:b0d420ccd31f9e4bc82362b86508622d8dd7d4a6
-
cups-ipp-utils_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
sha:e4fc356e8c722510ce811600a9b70cffd9929c2d
-
cups-ppdc_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
sha:f31c5470c9eee1e605475bbd5cf1bc4be4a300c8
-
cups-server-common_2.2.7-1ubuntu2.10+tuxcare.els6_all.deb
sha:5f4c620e0a4ea6cb63acd52d85fe995886a0d0b0
-
libcups2_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
sha:dd2c0b93e568b07f1df8325511dd7c9f9fe70e4c
-
libcups2-dev_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
sha:2793b62a6b1ec4dcef8e4ad33fe6214a23d89d03
-
libcupscgi1_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
sha:4389680c6b156581b0d29ae13fe04bca10134d4e
-
libcupsimage2_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
sha:f71e8e0a11cb99dde88f62d8c4d80d0efab993ca
-
libcupsimage2-dev_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
sha:50c070e411b390fc19edc1486c637201a949ede7
-
libcupsmime1_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
sha:571fa9e314d4280aab23be9b013332d042e8de40
-
libcupsppdc1_2.2.7-1ubuntu2.10+tuxcare.els6_amd64.deb
sha:b2ffb54e311e1b857033f0a303ed0b6957c2cba3
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.