{"id":"MGASA-2015-0270","summary":"Updated cups-filters package fixes security vulnerability","details":"A heap-based buffer overflow was discovered in the way the texttopdf\nutility of cups-filters processed print jobs with a specially crafted line\nsize. An attacker being able to submit print jobs could exploit this flaw\nto crash texttopdf or, possibly, execute arbitrary code with the\nprivileges of the 'lp' user (CVE-2015-3258, CVE-2015-3279).\n","modified":"2026-04-16T01:45:24.677255402Z","published":"2015-07-08T22:03:02Z","upstream":["CVE-2015-3258","CVE-2015-3279"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0270.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=16221"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1235385"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1238990"}],"affected":[{"package":{"name":"cups-filters","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/cups-filters?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.53-1.2.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0270.json"}},{"package":{"name":"cups-filters","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/cups-filters?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.71-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0270.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}