Пакет cups-lpd-1:2.4.10-12.el10_1.2.x86_64
| Имя | cups-lpd |
|---|---|
| Эпоха | 1 |
| Версия | 2.4.10 |
| Релиз | 12.el10_1.2 |
| Архитектура | x86_64 |
| Сайт | https://openprinting.github.io/cups/ |
| Лицензия | Apache-2.0 WITH LLVM-exception AND BSD-3-Clause AND Zlib AND BSD-2-Clause |
| Время сборки | 2026-01-14 00:00:43 |
| Хост сборки | builder-x86-03.inferitos.ru |
| Краткое описание | CUPS printing system - lpd emulation |
| Репозитории | AppStream |
| Полное описание | CUPS printing system provides a portable printing layer for UNIX® operating systems. This is the package that provides standard lpd emulation. |
| Эррата | — |
| Размер | 27 КиБ |
| Исходный проект | cups-2.4.10-12.el10_1.2 |
| Контрольная сумма SHA-256 | ef6d5a0f4d272598f5eeb98ccd03958e805906817856c56079a2997947bf7503 |
×
* Fri Dec 12 2025 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-12.2 - fix use-after-free reported by OSH * Fri Dec 05 2025 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-12.1 - RHEL-129721 CVE-2025-58436 cups: Slow client communication leads to a possible DoS attack - RHEL-129715 CVE-2025-61915 cups: Local denial-of-service via cupsd.conf update and related issues * Fri Sep 12 2025 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 1:2.4.10-12 - Rebuilt for MSVSphere 10 * Thu Sep 11 2025 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-12 - RHEL-112419 CVE-2025-58060 cups: Authentication Bypass in CUPS Authorization Handling - RHEL-113073 CVE-2025-58364 cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS * Tue Jan 07 2025 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-11 - provide a way how to opt-out from system crypto policy if needed * Fri Dec 06 2024 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-10 - RHEL-68415 Inability to disable weak ciphers in CUPS configuration * Mon Dec 02 2024 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-9 - RHEL-69638 IPP Everywhere permanent queue is not removed if PPD generation fails * Mon Nov 25 2024 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-8 - RHEL-45525 cups-2.4.10-2.el10: RHEL SAST Automation: address 1 High impact true positive(s) - RHEL-60354 CVE-2024-47175 cups: remote command injection via attacker controlled data in PPD file * Fri Nov 22 2024 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-8 - RHEL-54579 [rhel-10] Do not look into /root/.cups/lpoptions when using cupsGetNamedDest as root * Thu Nov 14 2024 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-7 - RHEL-67580 Move /etc/cups/ssl into cups-filesystem and require filesystem in libs