CVE-2025-64503

Publication date 12 November 2025

Last updated 20 November 2025


Ubuntu priority

Cvss 3 Severity Score

4.0 · Medium

Score breakdown

Description

cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large `MediaBox` value, an attacker can cause CUPS-Filter 1.x’s `pdftoraster` tool to write beyond the bounds of an array. First, a PDF with a large `MediaBox` width value causes `header.cupsWidth` to become large. Next, the calculation of `bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8` overflows, resulting in a small value. Then, `lineBuf` is allocated with the small `bytesPerLine` size. Finally, `convertLineChunked` calls `writePixel8`, which attempts to write to `lineBuf` outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same `bytesPerLine` multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c59791bde568631865 contains a patch, which is incorporated into cups-filters version 1.28.18.

Read the notes from the security team

Status

Package Ubuntu Release Status
cups-filters 25.10 questing
Not affected
25.04 plucky
Not affected
24.04 LTS noble
Not affected
22.04 LTS jammy
Needs evaluation
20.04 LTS focal
Needs evaluation
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
libcupsfilters 25.10 questing
Fixed 2.1.1-0ubuntu3.1
25.04 plucky
Fixed 2.1.1-0ubuntu2.1
24.04 LTS noble
Fixed 2.0.0-0ubuntu7.2
22.04 LTS jammy Not in release

Notes


mdeslaur

filename changed from pdftoraster.cxx to pdftoraster.c in newer versions In cups-filters 2.x, this is just a wrapper

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
cups-filters
libcupsfilters

Severity score breakdown

Parameter Value
Base score 4.0 · Medium
Attack vector Local
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact Low
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

References

Related Ubuntu Security Notices (USN)

    • USN-7878-1
    • cups-filters vulnerabilities
    • 20 November 2025
    • USN-7877-1
    • libcupsfilters vulnerabilities
    • 20 November 2025

Other references