--- vuln.xml (revision 390877) +++ vuln.xml (working copy) @@ -57,6 +57,44 @@ --> + + cups-filters -- buffer overflow in texttopdf size allocation + + + cups-filters + 1.0.70 + + + + +

Stefan Cornelius from Red Hat reports:

+
+

A heap-based buffer overflow was discovered in the way the + texttopdf utility of cups-filters processed print jobs with a + specially crafted line size. An attacker being able to submit + print jobs could exploit this flaw to crash texttopdf or, + possibly, execute arbitrary code.

+
+

Till Kamppeter reports:

+
+

texttopdf: Fixed buffer overflow on size allocation of texttopdf + when working with extremely small line sizes, which causes the size + calculation to result in 0 (CVE-2015-3258, thanks to Stefan + Cornelius from Red Hat for the patch).

+
+ +
+ + CVE-2015-3258 + http://www.openwall.com/lists/oss-security/2015/06/26/4 + http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7363 + + + 2015-06-26 + 2015-06-29 + +
+ qemu -- Heap overflow in QEMU PCNET controller, allowing guest to host escape (CVE-2015-3209)