|
Message-ID: <20150626195914.6809395a@redhat.com> Date: Fri, 26 Jun 2015 19:59:14 +0200 From: Stefan Cornelius <scorneli@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: CVE-2015-3258 cups-filters: texttopdf heap-based buffer overflow On Fri, 26 Jun 2015 18:43:26 +0200 Stefan Cornelius <scorneli@...hat.com> wrote: > Hi, > > A heap-based buffer overflow was discovered in the way the texttopdf > utility of cups-filters processed print jobs with a specially crafted > line size. An attacker being able to submit print jobs could exploit > this flaw to crash texttopdf or, possibly, execute arbitrary code. > > This was discovered by Petr Sklenar of Red Hat. > > This is fixed in cups-filters 1.0.70. > > Patch: > http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7363 > > Minor note on the side: The commit thanks me for the patch. The patch > was created by Tim Waugh of Red Hat, I've merely forwarded it. > > Red Hat bug: > https://bugzilla.redhat.com/show_bug.cgi?id=1235385 > > Thanks, Hi again, I think there's a possible problem with the patch that I failed to catch earlier in the process, so you may want to hold packaging for a bit until this is fully investigated. Sorry for the inconvenience. -- Stefan Cornelius / Red Hat Product Security
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.