First published: Wed Jan 08 2025(Updated: )
Low: cups security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cups | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-client | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-client-debuginfo | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-client-debuginfo | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-debuginfo | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-debuginfo | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-debugsource | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-debugsource | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-devel | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-devel | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-filesystem | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-ipptool | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-ipptool-debuginfo | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-ipptool-debuginfo | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-libs | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-libs | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-libs-debuginfo | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-libs-debuginfo | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-lpd | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-lpd-debuginfo | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-lpd-debuginfo | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-client | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-ipptool | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-lpd | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-client | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-client-debuginfo | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-debuginfo | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-debugsource | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-devel | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-ipptool | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-ipptool-debuginfo | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-libs | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-libs-debuginfo | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-lpd | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups-lpd-debuginfo | <2.2.6-62.el8_10 | 2.2.6-62.el8_10 |
redhat/cups | <2.2.6-62.el8_10.aa | 2.2.6-62.el8_10.aa |
redhat/cups-client | <2.2.6-62.el8_10.aa | 2.2.6-62.el8_10.aa |
redhat/cups-client-debuginfo | <2.2.6-62.el8_10.aa | 2.2.6-62.el8_10.aa |
redhat/cups-debuginfo | <2.2.6-62.el8_10.aa | 2.2.6-62.el8_10.aa |
redhat/cups-debugsource | <2.2.6-62.el8_10.aa | 2.2.6-62.el8_10.aa |
redhat/cups-devel | <2.2.6-62.el8_10.aa | 2.2.6-62.el8_10.aa |
redhat/cups-ipptool | <2.2.6-62.el8_10.aa | 2.2.6-62.el8_10.aa |
redhat/cups-ipptool-debuginfo | <2.2.6-62.el8_10.aa | 2.2.6-62.el8_10.aa |
redhat/cups-libs | <2.2.6-62.el8_10.aa | 2.2.6-62.el8_10.aa |
redhat/cups-libs-debuginfo | <2.2.6-62.el8_10.aa | 2.2.6-62.el8_10.aa |
redhat/cups-lpd | <2.2.6-62.el8_10.aa | 2.2.6-62.el8_10.aa |
redhat/cups-lpd-debuginfo | <2.2.6-62.el8_10.aa | 2.2.6-62.el8_10.aa |
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux Server for IBM z Systems |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:0083 is classified as Low.
You can fix RHSA-2025:0083 by updating to the package version 2.2.6-62.el8_10 or newer.
RHSA-2025:0083 addresses a remote command injection vulnerability via attacker-controlled data in PPD files, identified as CVE-2024-47175.
RHSA-2025:0083 affects systems running the Common UNIX Printing System (CUPS) version prior to 2.2.6-62.el8_10.
Yes, RHSA-2025:0083 is specifically related to Red Hat Enterprise Linux.