{"id":"USN-2831-1","summary":"cups-filters vulnerability","details":"Michal Kowalczyk discovered that the cups-filters foomatic-rip filter\nincorrectly stripped shell escape characters. A remote attacker could\npossibly use this issue to execute arbitrary code as the lp user.\n","modified":"2026-04-22T09:18:53.059414Z","published":"2015-12-07T13:48:08Z","related":["UBUNTU-CVE-2015-8327"],"upstream":["CVE-2015-8327","UBUNTU-CVE-2015-8327"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2831-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-8327"}],"affected":[{"package":{"name":"cups-filters","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/cups-filters@1.0.52-0ubuntu1.6?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.52-0ubuntu1.6"}]}],"versions":["1.0.40-0ubuntu1","1.0.40-0ubuntu2","1.0.41-0ubuntu1","1.0.41-2","1.0.42-1","1.0.42-2","1.0.43-1","1.0.44-1","1.0.44-2","1.0.45-1","1.0.46-0ubuntu1","1.0.47-0ubuntu1","1.0.48-0ubuntu1","1.0.48-0ubuntu2","1.0.49-0ubuntu1","1.0.50-0ubuntu1","1.0.51-0ubuntu1","1.0.52-0ubuntu1","1.0.52-0ubuntu1.1","1.0.52-0ubuntu1.2","1.0.52-0ubuntu1.4","1.0.52-0ubuntu1.5"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.0.52-0ubuntu1.6","binary_name":"cups-browsed"},{"binary_version":"1.0.52-0ubuntu1.6","binary_name":"cups-filters"},{"binary_version":"1.0.52-0ubuntu1.6","binary_name":"cups-filters-core-drivers"},{"binary_version":"1.0.52-0ubuntu1.6","binary_name":"libcupsfilters1"},{"binary_version":"1.0.52-0ubuntu1.6","binary_name":"libfontembed1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2831-1.json","cves_map":{"cves":[{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-8327"}],"ecosystem":"Ubuntu:14.04:LTS"}}}],"schema_version":"1.7.5"}