cups-filters 1.0.53 security tracking bug
Bug #1316229 reported by
Marc Deslauriers
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
cups-filters (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Trusty |
Fix Released
|
Medium
|
Marc Deslauriers | ||
Utopic |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
cups-filters 1.0.53 contains two security issues.
CVE numbers have been requested, but are not yet available:
Related branches
CVE References
Changed in cups-filters (Ubuntu Utopic): | |
status: | New → Fix Released |
Changed in cups-filters (Ubuntu Trusty): | |
status: | New → In Progress |
assignee: | nobody → Marc Deslauriers (mdeslaur) |
importance: | Undecided → Medium |
To post a comment you must log in.
This bug was fixed in the package cups-filters - 1.0.52-0ubuntu1.1
---------------
cups-filters (1.0.52-0ubuntu1.1) trusty-security; urgency=medium
* SECURITY UPDATE: arbitrary code injection via malicous print servers patches/ CVE-2014- 2707-part2. patch: also sanitize remote browsed. c. patches/ fix_browseallow .patch: Deny access if BrowseAllow browsed. c.
(LP: #1316229)
- debian/
queue name in utils/cups-
- CVE number pending
* SECURITY UPDATE: BrowseAllow option fails open (LP: #1316229)
- debian/
option is invalid in utils/cups-
- CVE number pending
-- Marc Deslauriers <email address hidden> Mon, 05 May 2014 13:02:52 -0400