Foomatic is a comprehensive, spooler-independent database of printers, printer drivers, and driver descriptions. The package also includes spooler-independent command line interfaces to manipulate queues and to print files and manipulate print jobs. It was discovered that the unhtmlify() function of foomatic-rip did not correctly calculate buffer sizes, possibly leading to a heap-based memory corruption. A malicious attacker could exploit this flaw to cause foomatic-rip to crash or, possibly, execute arbitrary code. (CVE-2010-5325) It was discovered that foomatic-rip failed to remove all shell special characters from inputs used to construct command lines for external programs run by the filter. An attacker could possibly use this flaw to execute arbitrary commands. (CVE-2015-8327, CVE-2015-8560) All foomatic users should upgrade to this updated package, which contains backported patches to correct these issues.
CPE | Name | Operator | Version |
---|---|---|---|
foomatic | eq | 4.0.4__3.el6 | |
foomatic | eq | 4.0.4__1.el6 | |
foomatic | eq | 4.0.4__1.el6_1.1 | |
foomatic | eq | 4.0.4__3.el6 | |
foomatic | eq | 4.0.4__1.el6 | |
foomatic | eq | 4.0.4__1.el6_1.1 |
bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS
bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406
lists.opensuse.org/opensuse-updates/2016-01/msg00065.html
rhn.redhat.com/errata/RHSA-2016-0491.html
www.debian.org/security/2015/dsa-3411
www.debian.org/security/2015/dsa-3429
www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
www.securityfocus.com/bid/78524
www.ubuntu.com/usn/USN-2831-1
www.ubuntu.com/usn/USN-2831-2
access.redhat.com/security/updates/classification/#moderate
bugs.debian.org/cgi-bin/bugreport.cgi?bug=806886
lists.debian.org/debian-printing/2015/11/msg00020.html
lists.debian.org/debian-printing/2015/12/msg00001.html
rhn.redhat.com/errata/RHSA-2016-0491.html