foomatic is vulnerable to denial of service (DoS) attacks. The vulnerability exists as a heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters before 4.0.6 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via a long job title.
bzr.linuxfoundation.org/loggerhead/openprinting/foomatic-4.0/foomatic-filters/annotate/head:/ChangeLog
rhn.redhat.com/errata/RHSA-2016-0491.html
www.openwall.com/lists/oss-security/2016/02/15/1
www.openwall.com/lists/oss-security/2016/02/15/7
www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
access.redhat.com/security/updates/classification/#moderate
bugs.linuxfoundation.org/show_bug.cgi?id=515
bugzilla.redhat.com/show_bug.cgi?id=1218297
rhn.redhat.com/errata/RHSA-2016-0491.html