{"id":"USN-2838-1","summary":"cups-filters vulnerability","details":"Adam Chester discovered that the cups-filters foomatic-rip filter\nincorrectly stripped shell escape characters. A remote attacker could\npossibly use this issue to execute arbitrary code as the lp user.\n","modified":"2026-04-22T09:19:10.661131Z","published":"2015-12-16T17:20:00Z","related":["UBUNTU-CVE-2015-8560"],"upstream":["CVE-2015-8560","UBUNTU-CVE-2015-8560"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2838-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-8560"}],"affected":[{"package":{"name":"cups-filters","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/cups-filters@1.0.52-0ubuntu1.7?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.52-0ubuntu1.7"}]}],"versions":["1.0.40-0ubuntu1","1.0.40-0ubuntu2","1.0.41-0ubuntu1","1.0.41-2","1.0.42-1","1.0.42-2","1.0.43-1","1.0.44-1","1.0.44-2","1.0.45-1","1.0.46-0ubuntu1","1.0.47-0ubuntu1","1.0.48-0ubuntu1","1.0.48-0ubuntu2","1.0.49-0ubuntu1","1.0.50-0ubuntu1","1.0.51-0ubuntu1","1.0.52-0ubuntu1","1.0.52-0ubuntu1.1","1.0.52-0ubuntu1.2","1.0.52-0ubuntu1.4","1.0.52-0ubuntu1.5","1.0.52-0ubuntu1.6"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"cups-browsed","binary_version":"1.0.52-0ubuntu1.7"},{"binary_name":"cups-filters","binary_version":"1.0.52-0ubuntu1.7"},{"binary_name":"cups-filters-core-drivers","binary_version":"1.0.52-0ubuntu1.7"},{"binary_name":"libcupsfilters1","binary_version":"1.0.52-0ubuntu1.7"},{"binary_name":"libfontembed1","binary_version":"1.0.52-0ubuntu1.7"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-8560"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2838-1.json"}}],"schema_version":"1.7.5"}