Debian Linux Security Advisory 3303-1 - It was discovered that the texttopdf utility, part of cups-filters, was susceptible to multiple heap-based buffer overflows due to improper handling of print jobs with a specially crafted line size. This could allow remote attackers to crash texttopdf or possibly execute arbitrary code.
c4cda9b519e70e14626d7d44c19ba37e1eff42e47edb6f66dae560941f93ea98
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3303-1 security@debian.org
https://www.debian.org/security/ Alessandro Ghedini
July 07, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : cups-filters
CVE ID : CVE-2015-3258 CVE-2015-3279
It was discovered that the texttopdf utility, part of cups-filters, was
susceptible to multiple heap-based buffer overflows due to improper
handling of print jobs with a specially crafted line size. This could
allow remote attackers to crash texttopdf or possibly execute arbitrary
code.
For the oldstable distribution (wheezy), these problems have been fixed
in version 1.0.18-2.1+deb7u2.
For the stable distribution (jessie), these problems have been fixed in
version 1.0.61-5+deb8u1.
For the unstable distribution (sid), these problems have been fixed in
version 1.0.71-1.
We recommend that you upgrade your cups-filters packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=iIn9
-----END PGP SIGNATURE-----