-
Notifications
You must be signed in to change notification settings - Fork 273
Description
Before you write the report
Read the REPORTING_ISSUES.md file in the main repository and prepare data mentioned there which looks relevant to you issue.
Describe the bug
The cupsd process has 100% CPU load until killed / restarted.
The web UI until restart is unresponsive, i.e. connecting with the browser shows the page loads forever.
Last log entry on DEBUG level: "[Client 12345] Connection now encrypted." and no log lines after that until restart.
To Reproduce
Steps to reproduce the behavior:
Could find no way to reproduce. We see the problem to occur about once a week.
Expected behavior
The cupsd process does not cause a CPU load of 100% and connections to the web UI are possible.
Screenshots
top - 16:24:23 up 14 days, 11:23, 1 user, load average: 1.13, 1.18, 1.12
Tasks: 149 total, 2 running, 146 sleeping, 0 stopped, 1 zombie
%Cpu(s): 48.6 us, 0.0 sy, 0.0 ni, 48.6 id, 0.0 wa, 0.0 hi, 0.0 si, 2.8 st
MiB Mem : 3916.1 total, 294.0 free, 405.1 used, 3217.1 buff/cache
MiB Swap: 0.0 total, 0.0 free, 0.0 used. 3267.9 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
53082 root 20 0 345.5m 24.5m 13.7m R 100.0 0.6 120:26.50 /usr/sbin/cupsd -l
System Information:
- OS and its version: AmazonLinux 2023
- CUPS version 1:2.4.14-1.amzn2023.0.2
Additional context
We had no such problems with cups until about 2026-02-06.
The DNF logs show, that the upgrade of cups to 1:2.4.14-1.amzn2023.0.2 was done on 2026-01-12.
The Amazon Linux 2023 version 2023.10.20260105 release notes showed, that cups was to be updated and ALAS2023-2025-1320 shows, that CVE-2025-58436 was part of the update. This fixes something in the client connection. Also the patch file shows, that the connection handling was changed.
This is the commit referenced in the CVE: 40008d7