UbuntuUpdates.org

Package "cups-browsed"

Name: cups-browsed

Description:

OpenPrinting CUPS Filters - cups-browsed

Latest version: 1.28.15-0ubuntu1.5
Release: jammy (22.04)
Level: security
Repository: main
Head package: cups-filters
Homepage: http://www.openprinting.org/

Links


Download "cups-browsed"


Other versions of "cups-browsed" in Jammy

Repository Area Version
base main 1.28.15-0ubuntu1
updates main 1.28.15-0ubuntu1.5

Changelog

Version: 1.28.15-0ubuntu1.5 2025-11-20 20:07:09 UTC

  cups-filters (1.28.15-0ubuntu1.5) jammy-security; urgency=medium

  * SECURITY UPDATE: heap-buffer overflow write in cfImageLut
    - debian/patches/CVE-2025-57812-1.patch: use bpp in
      cupsfilters/image-tiff.c.
    - debian/patches/CVE-2025-57812-2.patch: reject color images with 1 bit
      per sample in cupsfilters/image-tiff.c.
    - debian/patches/CVE-2025-57812-3.patch: reject images where the number
      of samples does not correspond with the color space in
      cupsfilters/image-tiff.c.
    - debian/patches/CVE-2025-57812-4.patch: reject images with planar
      color configuration in cupsfilters/image-tiff.c.
    - debian/patches/CVE-2025-57812-5.patch: reject images with vertical
      scanlines in cupsfilters/image-tiff.c.
    - CVE-2025-57812
  * SECURITY UPDATE: out-of-bounds write in cfFilterPDFToRaster()
    - debian/patches/CVE-2025-64503.patch: validate page size in
      filter/pdftoraster.cxx.
    - CVE-2025-64503
  * SECURITY UPDATE: Heap Buffer Overflow in rastertopclx Filter
    - debian/patches/CVE-2025-64524.patch: initialize memory and add checks
      to filter/rastertopclx.c.
    - CVE-2025-64524

 -- Marc Deslauriers <email address hidden> Thu, 13 Nov 2025 09:48:58 -0500

Source diff to previous version
CVE-2025-57812 CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as
CVE-2025-64503 cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos.

Version: 1.28.15-0ubuntu1.4 2024-10-09 14:07:12 UTC

  cups-filters (1.28.15-0ubuntu1.4) jammy-security; urgency=medium

  * SECURITY UPDATE: more complete fix for CVE-2024-47176
    - debian/patches/CVE-2024-47176-2.patch: completely remove support for
      legacy CUPS protocol and LDAP.
    - CVE-2024-47176
  * debian/patches/sec-202409-1.patch: renamed to CVE-2024-47076.patch.
  * debian/patches/sec-202409-2.patch: renamed to CVE-2024-47176-1.patch.

 -- Marc Deslauriers <email address hidden> Tue, 08 Oct 2024 07:41:04 -0400

Source diff to previous version
CVE-2024-47176 CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, aut
CVE-2024-47076 CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as

Version: 1.28.15-0ubuntu1.3 2024-09-26 22:06:50 UTC

  cups-filters (1.28.15-0ubuntu1.3) jammy-security; urgency=medium

  * SECURITY UPDATE: PPD injection issues (LP: #2082335)
    - debian/patches/sec-202409-1.patch: validate response attributes
      before return in cupsfilters/ipp.c.
    - debian/patches/sec-202409-2.patch: disable legacy CUPS protocol in
      configure.ac.
    - CVE number pending

 -- Marc Deslauriers <email address hidden> Thu, 26 Sep 2024 10:21:15 -0400

Source diff to previous version

Version: 1.28.15-0ubuntu1.2 2023-05-17 17:07:46 UTC

  cups-filters (1.28.15-0ubuntu1.2) jammy-security; urgency=medium

  * SECURITY UPDATE: code execution in beh CUPS backend
    - debian/patches/CVE-2023-24805-1.patch: use execv() instead of
      system() in backend/beh.c.
    - debian/patches/CVE-2023-24805-2.patch: extra checks against
      odd/forged input in backend/beh.c.
    - debian/patches/CVE-2023-24805-3.patch: further improvements in
      backend/beh.c.
    - CVE-2023-24805

 -- Marc Deslauriers <email address hidden> Mon, 15 May 2023 10:35:05 -0400




About   -   Send Feedback to @ubuntu_updates