Source: ippsample
Version: 0.0~git20220607.72f89b3-1
Severity: normal
ippsample bundles a copy of PDFio, which is affected by CVE-2023-24808.
Not sure if the code is even reachable and even if it's just a crash
in a CLI tool.
Cheers,
Moritz
Package: cups
Severity: minor
Now that src:cups follows the openprinting fork, Homepage: should also point to
https://github.com/OpenPrinting/cups/ I suppose?
Cheers,
Moritz
On Thu, Oct 27, 2016 at 06:31:43AM -0400, Roberto C. Sánchez wrote:
> On Thu, Oct 27, 2016 at 08:54:39AM +0200, Moritz Muehlenhoff wrote:
> >
> > Salvatore mentioned that the same bug occurs when unstable has the security
> > patches merged (which hasn't happened so far
On Wed, Oct 26, 2016 at 11:09:54PM -0400, Roberto C. Sánchez wrote:
> On Tue, Oct 25, 2016 at 09:54:01PM +0200, Salvatore Bonaccorso wrote:
> > Hi Roberto
> >
> > Could you double-check/confirm if you see the same
> > https://bugs.debian.org/840691 in wheezy? Note although the bug is
> > still ass
On Wed, Dec 02, 2015 at 02:36:06PM +0100, Didier 'OdyX' Raboud wrote:
> Le mardi, 1 décembre 2015, 09.14:12 Moritz Muehlenhoff a écrit :
> > B0;115;0cOn Mon, Nov 30, 2015 at 10:21:58PM +0100, Didier 'OdyX'
> Raboud wrote:
> > > Hi Till,
> > >
B0;115;0cOn Mon, Nov 30, 2015 at 10:21:58PM +0100, Didier 'OdyX' Raboud wrote:
> Hi Till,
>
> Le jeudi, 26 novembre 2015, 18.08:16 Till Kamppeter a écrit :
> > I have released cups-filters 1.2.0 now, with the following changes:
> >
> > - cups-browsed: When using IP-address-based device URIs via t
Package: cups-filters
Severity: grave
Tags: security
Justification: user security hole
Hi,
please see https://bugs.linuxfoundation.org/show_bug.cgi?id=1265
Cheers,
Moritz
--
To UNSUBSCRIBE, email to debian-printing-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Cont
Package: cups
Severity: grave
Tags: security
This was assigned CVE-2014-9679 and is fixed in experimental
already: https://www.cups.org/str.php?L4551
Cheers,
Moritz
--
To UNSUBSCRIBE, email to debian-printing-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact li
Package: ghostscript
Version: 9.05~dfsg-8.1
Severity: important
As pre-announced in
https://lists.debian.org/debian-devel/2013/12/msg00570.html
it is planned to remove lcms1 for jessie.
According to the changelog this is mostly done:
| * Link against lcms2 (not lcms1).
|Regenerate autoconf
On Tue, Mar 11, 2014 at 02:57:53PM +0100, Didier 'OdyX' Raboud wrote:
> Hi dear security team,
>
> Now for CUPS in oldstable…
>
> Le mardi, 11 mars 2014, 11.50:27 Didier 'OdyX' Raboud a écrit :
> > > CVE-2013-6474:
> > > CVE-2013-6475:
> > > CVE-2013-6476:
> > > http://bzr.linuxfoundation.org/log
Package: cups-filters
Severity: grave
Tags: security
Justification: user security hole
Hi,
Fixed upstream in 1.0.47:
CVE-2013-6473:
http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7175
CVE-2013-6474:
CVE-2013-6475:
CVE-2013-6476:
http://bzr.linuxfoundation.org/logger
Distribution: oldstable-security
Urgency: low
Maintainer: Debian HPIJS and HPLIP maintainers
Changed-By: Moritz Muehlenhoff
Description:
hpijs - HP Linux Printing and Imaging - gs IJS driver (hpijs)
hpijs-ppds - HP Linux Printing and Imaging - HPIJS PPD files
hplip - HP Linux Printing and
-hpaio
Architecture: source all amd64
Version: 3.12.6-3.1+deb7u1
Distribution: stable-security
Urgency: low
Maintainer: Debian HPIJS and HPLIP maintainers
Changed-By: Moritz Muehlenhoff
Description:
hpijs - transitional dummy package for hpijs printer driver
hpijs-ppds - HP Linux Printing
Package: hplip
Severity: grave
Tags: security
Justification: user security hole
Please see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4325 for details
and a patch.
Cheers,
Moritz
--
To UNSUBSCRIBE, email to debian-printing-requ...@lists.debian.org
with a subject of "unsubscri
Package: hplip
Severity: grave
Tags: security
Justification: user security hole
Several further insecurely handled temporary files were discovered by Red Hat:
https://www.redhat.com/archives/enterprise-watch-list/2013-February/msg00024.html
I've extracted the patch from the RHEL update, it's atta
Package: hplip
Severity: important
Tags: patch
Please enable hardened build flags through dpkg-buildflags.
Patch attached. (dpkg-buildflags abides "noopt" from DEB_BUILD_OPTIONS)
Cheers,
Moritz
diff -aur hplip-3.12.2.harden/debian/rules hplip-3.12.2/debian/rules
--- hplip-3.12.2.harden/d
severity 657047 serious
thanks
On Mon, Jan 23, 2012 at 07:22:09PM +0100, Ronny Standtke wrote:
> Source: hplip
> Version: 3.11.12-2
> Severity: normal
>
> *** Please type your report below this line ***
>
> I always backport new versions of hplip to squeeze. This worked without
> any problem so
On Sat, Nov 27, 2010 at 02:01:30PM +0100, Didier 'OdyX' Raboud wrote:
> Le Thursday 30 September 2010 19:39:18 Till Kamppeter, vous avez écrit :
> > Package: foomatic-gui
> > Version: 0.7.9.3
> > Severity: serious
> >
> > The printer setup tools provided by the foomatic-gui source package,
> > pri
Package: hplip
Severity: grave
Tags: security
Two security issues have been reported in hplip:
1. Shell command injection in foomatic-rip-hplip:
https://bugzilla.novell.com/show_bug.cgi?id=698451
This is CVE-2011-2697
2. Insecure tempfile handling:
https://bugzilla.novell.com/show_bug.cgi?id=70
Package: foo2zjs
Severity: grave
Tags: security
The following security issue was reported in foo2zjs:
https://bugs.launchpad.net/bugs/805370
It doesn't warrant a DSA, but could be fixed in a point
update.
Cheers,
Moritz
--
To UNSUBSCRIBE, email to debian-printing-requ...@lists.debian
: Debian HPIJS and HPLIP maintainers
Changed-By: Moritz Muehlenhoff
Description:
hpijs - HP Linux Printing and Imaging - gs IJS driver (hpijs)
hpijs-ppds - HP Linux Printing and Imaging - HPIJS PPD files
hplip - HP Linux Printing and Imaging System (HPLIP)
hplip-data - HP Linux
Package: hplip
Severity: grave
Tags: security
Hi,
please see https://bugzilla.redhat.com/show_bug.cgi?id=662740 for
the description and a patch by Sebastian Krahmer.
A DSA is in preparation, for Squeeze please upload the isolated
security fix with urgency=high and ask for an unblock on
debian-rel
22 matches
Mail list logo