[CLSA-2025:1759410214] Fix CVE(s): CVE-2025-58364
Type:
security
Severity:
Moderate
Release date:
2025-10-02 13:03:39 UTC
Description:
* SECURITY UPDATE: IPP extension tag parsing vulnerability - debian/patches/CVE-2025-58364.patch: fix handling of extension tag in ipp_read_io() - CVE-2025-58364
Updated packages:
  • cups_2.2.7-1ubuntu2.10+tuxcare.els7_amd64.deb
    sha:c332c069f040397a5fe9ae511f804998fda4f862
  • cups-bsd_2.2.7-1ubuntu2.10+tuxcare.els7_amd64.deb
    sha:1c3e78b0f44b3f9228e167558d461bb68decc581
  • cups-client_2.2.7-1ubuntu2.10+tuxcare.els7_amd64.deb
    sha:27c914c2d974d073feca8ecfcbe9f85b24e70fe6
  • cups-common_2.2.7-1ubuntu2.10+tuxcare.els7_all.deb
    sha:369e6d87e1d67a52d36070f6af596fb6180eab31
  • cups-core-drivers_2.2.7-1ubuntu2.10+tuxcare.els7_amd64.deb
    sha:4e4a4e10aaef28bc9cf11b7716bcb2e94ffd3fd1
  • cups-daemon_2.2.7-1ubuntu2.10+tuxcare.els7_amd64.deb
    sha:f18b5eae65f2959158d5010ac85213659f8d6a67
  • cups-ipp-utils_2.2.7-1ubuntu2.10+tuxcare.els7_amd64.deb
    sha:da2a7f598813da16a3785fbf64ab79566a9f7989
  • cups-ppdc_2.2.7-1ubuntu2.10+tuxcare.els7_amd64.deb
    sha:aca6c9711071c9249dd900abd64743dec30f9504
  • cups-server-common_2.2.7-1ubuntu2.10+tuxcare.els7_all.deb
    sha:85229d67fd09f4410c0c0651d57a4aa15e5f1679
  • libcups2_2.2.7-1ubuntu2.10+tuxcare.els7_amd64.deb
    sha:c6d83faebd562f016712ee75f41842dfb8f0dae5
  • libcups2-dev_2.2.7-1ubuntu2.10+tuxcare.els7_amd64.deb
    sha:ff6681a4beba5103b549fd69e26b1ff60115d4c0
  • libcupscgi1_2.2.7-1ubuntu2.10+tuxcare.els7_amd64.deb
    sha:a14c684f4ce7b505e2440027869f976cabb48332
  • libcupsimage2_2.2.7-1ubuntu2.10+tuxcare.els7_amd64.deb
    sha:c38aab3bbfad649d6c448968231b6649316d9746
  • libcupsimage2-dev_2.2.7-1ubuntu2.10+tuxcare.els7_amd64.deb
    sha:f981cfcc30690919d1755006fd5d09fee22b29d2
  • libcupsmime1_2.2.7-1ubuntu2.10+tuxcare.els7_amd64.deb
    sha:0d4bb6d6500df36f84ca907a909dc2a7987c09a6
  • libcupsppdc1_2.2.7-1ubuntu2.10+tuxcare.els7_amd64.deb
    sha:fa9822c303f40997d61dc63e29723c0c8c7950c5
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.