Integer overflow in filter/texttopdf.c in texttopdf in cups-filters before 1.0.71 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted line size in a print job, which triggers a heap-based buffer overflow.
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "cups-browsed", "binary_version": "1.0.52-0ubuntu1.5" }, { "binary_name": "cups-browsed-dbgsym", "binary_version": "1.0.52-0ubuntu1.5" }, { "binary_name": "cups-filters", "binary_version": "1.0.52-0ubuntu1.5" }, { "binary_name": "cups-filters-core-drivers", "binary_version": "1.0.52-0ubuntu1.5" }, { "binary_name": "cups-filters-core-drivers-dbgsym", "binary_version": "1.0.52-0ubuntu1.5" }, { "binary_name": "cups-filters-dbgsym", "binary_version": "1.0.52-0ubuntu1.5" }, { "binary_name": "libcupsfilters-dev", "binary_version": "1.0.52-0ubuntu1.5" }, { "binary_name": "libcupsfilters1", "binary_version": "1.0.52-0ubuntu1.5" }, { "binary_name": "libcupsfilters1-dbgsym", "binary_version": "1.0.52-0ubuntu1.5" }, { "binary_name": "libfontembed-dev", "binary_version": "1.0.52-0ubuntu1.5" }, { "binary_name": "libfontembed1", "binary_version": "1.0.52-0ubuntu1.5" }, { "binary_name": "libfontembed1-dbgsym", "binary_version": "1.0.52-0ubuntu1.5" } ] }