CUPS 'scheduler/select.c' Denial Of Service Vulnerability

Summary
This host is running CUPS (Common UNIX Printing System) Service, which is prone to Denial of Service vulnerability.
Impact
Successful exploitation allows remote attackers to execute arbitrary code and can cause denial of service. Impact Level: Application
Solution
Upgrade to version 1.5 or later, For updates refer to http://www.cups.org/software.php ***** NOTE: Please ignore this warning if the patch is applied. *****
Insight
The flaw is due to an use-after-free error within the 'cupsdDoSelect()' function in 'scheduler/select.c' when kqueue or epoll is used, allows remote attackers to crash or hang the daemon via a client disconnection during listing of a large number of print jobs.
Affected
CUPS versions 1.3.x, 1.4.x on Linux.
References