MGASA-2015-0270

Source
https://advisories.mageia.org/MGASA-2015-0270.html
Import Source
https://advisories.mageia.org/MGASA-2015-0270.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0270
Related
Published
2015-07-08T22:03:02Z
Modified
2015-07-09T07:56:53Z
Summary
Updated cups-filters package fixes security vulnerability
Details

A heap-based buffer overflow was discovered in the way the texttopdf utility of cups-filters processed print jobs with a specially crafted line size. An attacker being able to submit print jobs could exploit this flaw to crash texttopdf or, possibly, execute arbitrary code with the privileges of the 'lp' user (CVE-2015-3258, CVE-2015-3279).

References
Credits

Affected packages

Mageia:4 / cups-filters

Package

Name
cups-filters
Purl
pkg:rpm/mageia/cups-filters?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.53-1.2.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / cups-filters

Package

Name
cups-filters
Purl
pkg:rpm/mageia/cups-filters?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.71-1.mga5

Ecosystem specific

{
    "section": "core"
}