Null Pointer Dereference vulnerability in the ipp_read_io() function of the CUPS printing system. The flaw is caused by unsafe deserialization and improper validation of crafted printer attribute responses. When ippValidateAttributes() processes such responses, a null pointer dereference occurs, leading to application crash. This issue can be exploited remotely within the local subnet in default configurations, and in some cases over the network if IPP services are exposed. Exploitation requires no authentication or user interaction, allowing attackers to disrupt availability of printing services on affected systems.
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:15701 https://access.redhat.com/errata/RHSA-2025:15701
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:15700 https://access.redhat.com/errata/RHSA-2025:15700
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:16590 https://access.redhat.com/errata/RHSA-2025:16590
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2025:16591 https://access.redhat.com/errata/RHSA-2025:16591
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:16592 https://access.redhat.com/errata/RHSA-2025:16592