Out-of-bounds Write Affecting cups-filters package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.02% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN14-CUPSFILTERS-13961116
  • published14 Nov 2025
  • disclosed12 Nov 2025

Introduced: 12 Nov 2025

NewCVE-2025-64503  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

There is no fixed version for Debian:14 cups-filters.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cups-filters package and not the cups-filters package as distributed by Debian. See How to fix? for Debian:14 relevant fixed versions and status.

cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large MediaBox value, an attacker can cause CUPS-Filter 1.x’s pdftoraster tool to write beyond the bounds of an array. First, a PDF with a large MediaBox width value causes header.cupsWidth to become large. Next, the calculation of bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8 overflows, resulting in a small value. Then, lineBuf is allocated with the small bytesPerLine size. Finally, convertLineChunked calls writePixel8, which attempts to write to lineBuf outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same bytesPerLine multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c59791bde568631865 contains a patch, which is incorporated into cups-filters version 1.28.18.

CVSS Base Scores

version 3.1