This bug was fixed in the package cups-filters - 1.0.52-0ubuntu1.1

---------------
cups-filters (1.0.52-0ubuntu1.1) trusty-security; urgency=medium

  * SECURITY UPDATE: arbitrary code injection via malicous print servers
    (LP: #1316229)
    - debian/patches/CVE-2014-2707-part2.patch: also sanitize remote
      queue name in utils/cups-browsed.c.
    - CVE number pending
  * SECURITY UPDATE: BrowseAllow option fails open (LP: #1316229)
    - debian/patches/fix_browseallow.patch: Deny access if BrowseAllow
      option is invalid in utils/cups-browsed.c.
    - CVE number pending
 -- Marc Deslauriers <marc.deslauri...@ubuntu.com>   Mon, 05 May 2014 13:02:52 
-0400

** Changed in: cups-filters (Ubuntu Trusty)
       Status: In Progress => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-2707

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1316229

Title:
  cups-filters 1.0.53 security tracking bug

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cups-filters/+bug/1316229/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to