CVE-2015-3279

NameCVE-2015-3279
DescriptionInteger overflow in filter/texttopdf.c in texttopdf in cups-filters before 1.0.71 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted line size in a print job, which triggers a heap-based buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-314-1, DSA-3303-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cups (PTS)buster2.2.10-6+deb10u6fixed
buster (security)2.2.10-6+deb10u9fixed
bullseye2.3.3op2-3+deb11u6fixed
bullseye (security)2.3.3op2-3+deb11u2fixed
bookworm2.4.2-3+deb12u5fixed
sid, trixie2.4.7-1fixed
cups-filters (PTS)buster1.21.6-5fixed
buster (security)1.21.6-5+deb10u1fixed
bullseye (security), bullseye1.28.7-1+deb11u2fixed
sid, trixie, bookworm1.28.17-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cupssourcesqueeze1.4.4-7+squeeze10DLA-314-1
cupssource(unstable)1.5.0-16
cups-filterssourcewheezy1.0.18-2.1+deb7u2DSA-3303-1
cups-filterssourcejessie1.0.61-5+deb8u1DSA-3303-1
cups-filterssource(unstable)1.0.71-1

Notes

cups moved filters to separate package in 1.5.0-16
http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7365

Search for package or bug name: Reporting problems