ALT-PU-2015-1841-1
Package cups-filters updated to version 1.0.71-alt0.M70P.1 for branch p7 in task 150950.
Closed vulnerabilities
BDU:2015-10867
Уязвимость операционной системы Ubuntu, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-10868
Уязвимость операционной системы Debian GNU/Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-10869
Уязвимость операционной системы Ubuntu, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-10870
Уязвимость операционной системы Debian GNU/Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2015-2265
The remove_bad_chars function in utils/cups-browsed.c in cups-filters before 1.0.66 allows remote IPP printers to execute arbitrary commands via consecutive shell metacharacters in the (1) model or (2) PDL. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.
- http://advisories.mageia.org/MGASA-2015-0132.html
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7333
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:196
- http://www.ubuntu.com/usn/USN-2532-1
- https://bugs.linuxfoundation.org/show_bug.cgi?id=1265
- http://advisories.mageia.org/MGASA-2015-0132.html
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7333
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:196
- http://www.ubuntu.com/usn/USN-2532-1
- https://bugs.linuxfoundation.org/show_bug.cgi?id=1265
Modified: 2025-04-12
CVE-2015-3258
Heap-based buffer overflow in the WriteProlog function in filter/texttopdf.c in texttopdf in cups-filters before 1.0.70 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a small line size in a print job.
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7363
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html
- http://rhn.redhat.com/errata/RHSA-2015-2360.html
- http://ubuntu.com/usn/usn-2659-1
- http://www.debian.org/security/2015/dsa-3303
- http://www.openwall.com/lists/oss-security/2015/06/26/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75436
- https://bugzilla.redhat.com/show_bug.cgi?id=1235385
- https://security.gentoo.org/glsa/201510-08
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7363
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html
- http://rhn.redhat.com/errata/RHSA-2015-2360.html
- http://ubuntu.com/usn/usn-2659-1
- http://www.debian.org/security/2015/dsa-3303
- http://www.openwall.com/lists/oss-security/2015/06/26/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75436
- https://bugzilla.redhat.com/show_bug.cgi?id=1235385
- https://security.gentoo.org/glsa/201510-08
Modified: 2025-04-12
CVE-2015-3279
Integer overflow in filter/texttopdf.c in texttopdf in cups-filters before 1.0.71 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted line size in a print job, which triggers a heap-based buffer overflow.
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7365
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7366#NEWS
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7369
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html
- http://rhn.redhat.com/errata/RHSA-2015-2360.html
- http://ubuntu.com/usn/usn-2659-1
- http://www.debian.org/security/2015/dsa-3303
- http://www.openwall.com/lists/oss-security/2015/07/03/2
- http://www.openwall.com/lists/oss-security/2015/07/03/5
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75557
- https://bugzilla.redhat.com/show_bug.cgi?id=1238990
- https://security.gentoo.org/glsa/201510-08
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7365
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7366#NEWS
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7369
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html
- http://rhn.redhat.com/errata/RHSA-2015-2360.html
- http://ubuntu.com/usn/usn-2659-1
- http://www.debian.org/security/2015/dsa-3303
- http://www.openwall.com/lists/oss-security/2015/07/03/2
- http://www.openwall.com/lists/oss-security/2015/07/03/5
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75557
- https://bugzilla.redhat.com/show_bug.cgi?id=1238990
- https://security.gentoo.org/glsa/201510-08