{"id":"CVE-2015-3279","details":"Integer overflow in filter/texttopdf.c in texttopdf in cups-filters before 1.0.71 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted line size in a print job, which triggers a heap-based buffer overflow.","modified":"2026-04-16T01:42:48.875038545Z","published":"2015-07-14T16:59:03Z","withdrawn":"2026-01-27T04:14:59.134127Z","related":["SUSE-SU-2015:1377-1","openSUSE-SU-2024:10313-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2360.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3303"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201510-08"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1238990"},{"type":"WEB","url":"http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7365"},{"type":"WEB","url":"http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7366#NEWS"},{"type":"WEB","url":"http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7369"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html"},{"type":"WEB","url":"http://ubuntu.com/usn/usn-2659-1"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2015/07/03/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2015/07/03/5"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/75557"}],"schema_version":"1.7.3"}