<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for cups-filters is now available for openEuler-24.03-LTS-SP1</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-2751</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-11-28</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-11-28</InitialReleaseDate>
		<CurrentReleaseDate>2025-11-28</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-11-28</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">cups-filters security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for cups-filters is now available for openEuler-24.03-LTS-SP1</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">This project provides backends, filters, and other software that was once part of the core CUPS distribution but is no longer maintained by Apple Inc. In addition it contains additional filters and software developed independently of Apple, especially filters for the PDF-centric printing workflow introduced by OpenPrinting and a daemon to browse Bonjour broadcasts of remote CUPS printers to make these printers available locally and to provide backward compatibility to the old CUPS broadcasting and browsing of CUPS 1.5.x and older.

Security Fix(es):

cups-filters contains backends, filters, and other software required to get the CUPS printing service working on operating systems other than macOS. In versions 2.0.1 and prior, a heap-buffer-overflow vulnerability in the rastertopclx filter causes the program to crash with a segmentation fault when processing maliciously crafted input data. This issue can be exploited to trigger memory corruption, potentially leading to arbitrary code execution. This issue has been patched via commit 956283c.(CVE-2025-64524)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for cups-filters is now available for openEuler-24.03-LTS-SP1.

openEuler Security has rated this update as having a security impact of low. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Low</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">cups-filters</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2751</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-64524</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-64524</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openEuler-24.03-LTS-SP1</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="cups-filters-1.28.15-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">cups-filters-1.28.15-6.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="cups-filters-debuginfo-1.28.15-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">cups-filters-debuginfo-1.28.15-6.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="cups-filters-debugsource-1.28.15-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">cups-filters-debugsource-1.28.15-6.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="cups-filters-devel-1.28.15-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">cups-filters-devel-1.28.15-6.oe2403sp1.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="cups-filters-1.28.15-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">cups-filters-1.28.15-6.oe2403sp1.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="cups-filters-1.28.15-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">cups-filters-1.28.15-6.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="cups-filters-debuginfo-1.28.15-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">cups-filters-debuginfo-1.28.15-6.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="cups-filters-debugsource-1.28.15-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">cups-filters-debugsource-1.28.15-6.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="cups-filters-devel-1.28.15-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">cups-filters-devel-1.28.15-6.oe2403sp1.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="cups-filters-help-1.28.15-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">cups-filters-help-1.28.15-6.oe2403sp1.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">cups-filters contains backends, filters, and other software required to get the CUPS printing service working on operating systems other than macOS. In versions 2.0.1 and prior, a heap-buffer-overflow vulnerability in the rastertopclx filter causes the program to crash with a segmentation fault when processing maliciously crafted input data. This issue can be exploited to trigger memory corruption, potentially leading to arbitrary code execution. This issue has been patched via commit 956283c.</Note>
		</Notes>
		<ReleaseDate>2025-11-28</ReleaseDate>
		<CVE>CVE-2025-64524</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>3.3</BaseScore>
				<Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>cups-filters security update</Description>
				<DATE>2025-11-28</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2751</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>