Updated CUPS packages fix multiple vulnerabilities
A heap-based buffer overflow in CUPS 1.2.x and later was discovered by
regenrecht of VeriSign iDenfense that could allow a remote attacker
to execute arbitrary code via a crafted CGI search expression
(CVE-2008-0047).
A validation error in the Hp-GL/2 filter was also discovered
(CVE-2008-0053).
Finally, a vulnerability in how CUPS handled GIF files was found by
Tomas Hoger of Red Hat, similar to previous issues corrected in PHP,
gd, tk, netpbm, and SDL_image (CVE-2008-1373).
The updated packages have been patched to correct these issues.