A heap-based buffer overflow was discovered in the way the texttopdf utility of cups-filters processed print jobs with a specially crafted line size. An attacker being able to submit print jobs could exploit this flaw to crash texttopdf or, possibly, execute arbitrary code with the privileges of the 'lp' user. Acknowledgements: This issue was discovered by Petr Sklenar of Red Hat.
Patch: https://bugzilla.redhat.com/attachment.cgi?id=993617&action=diff
Public via/Patch: http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7363 Fixed in cups-filters 1.0.70.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:2360 https://rhn.redhat.com/errata/RHSA-2015-2360.html