CVE-2025-58364
Rocky Linux vulnerability analysis and mitigation

Overview

OpenPrinting CUPS, an open source printing system for Linux and Unix-like operating systems, was found to contain a security vulnerability (CVE-2025-58364) in versions 2.4.12 and earlier. The vulnerability stems from an unsafe deserialization and validation of printer attributes that causes a null dereference in the libcups library. This vulnerability was discovered and disclosed on September 11, 2025, and has been assigned a CVSS v3.1 base score of 6.5 (Medium severity) (NVD, GitHub Advisory).

Technical details

The vulnerability occurs in the ipp_read_io() function which is called internally by cupsDoRequest(). The issue manifests when processing specific combinations of printer attribute requests, particularly in the flow of ippNewRequest(IPP_OP_GET_PRINTER_ATTRIBUTES) followed by cupsDoRequest() and ippValidateAttributes(). The null dereference specifically happens in the line for (ptr = attr->values[i].string.text; *ptr; ptr++) when an attacker responds with a crafted printer attributes response. This vulnerability is present in two locations within OpenPrinting: cups/scheduler/ipp.c and libcupsfilters/cupsfilters/ipp.c (Openwall).

Impact

The vulnerability enables a remote Denial of Service (DoS) attack available in local subnet configurations. When successfully exploited, it can cause both cups and cups-browsed services to crash on all machines in the local network that are listening for printers, which is the default configuration for most Linux machines. On systems with unpatched CVE-2024-47176 (cups-filters 1.x/cups-browsed 2.x vulnerability) and exposed IPP ports to the internet, the attack vector extends to 'Network' rather than just 'Adjacent' (Security Online).

Mitigation and workarounds

The vulnerability has been patched in CUPS version 2.4.13. Organizations and users are strongly advised to upgrade to this version or later. The fix involves modifying the handling of extension tags in the ipp_read_io() function. Multiple Linux distributions have released security updates addressing this vulnerability, including Ubuntu which has provided fixes across multiple versions of their operating system (Ubuntu Security, GitHub Patch).

Additional resources


SourceThis report was generated using AI

Related Rocky Linux vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13020HIGH8.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
NoYesNov 11, 2025
CVE-2025-59088HIGH8.6
  • Rocky LinuxRocky Linux
  • idm:DL1::python3-ipaserver
NoYesNov 12, 2025
CVE-2025-13019HIGH8.1
  • NixOSNixOS
  • firefox-x11
NoYesNov 11, 2025
CVE-2025-59089MEDIUM5.9
  • Rocky LinuxRocky Linux
  • idm:DL1::ipa-common
NoYesNov 12, 2025
CVE-2025-40185N/AN/A
  • Linux KernelLinux Kernel
  • linux-riscv-6.14
NoYesNov 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management