MGASA-2015-0247

Source
https://advisories.mageia.org/MGASA-2015-0247.html
Import Source
https://advisories.mageia.org/MGASA-2015-0247.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0247
Related
Published
2015-06-19T13:33:05Z
Modified
2015-06-19T13:22:18Z
Summary
Updated cups package fixes security vulnerabilities
Details

It was discovered that CUPS incorrectly handled reference counting when handling localized strings. A remote attacker could use this issue to escalate permissions, upload a replacement CUPS configuration file, and execute arbitrary code (CVE-2015-1158).

It was discovered that the CUPS templating engine contained a cross-site scripting issue. A remote attacker could use this issue to bypass default configuration settings (CVE-2015-1159).

It was discovered that the CUPS server can get stuck in an infinite loop when a user queues a malformed gzip file. When this happens the CUPS server will be unable to service any further requests (STR#4602).

References
Credits

Affected packages

Mageia:4 / cups

Package

Name
cups
Purl
pkg:rpm/mageia/cups?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.0-7.5.mga4

Ecosystem specific

{
    "section": "core"
}