Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 27 Oct 2004 20:48:02 -0700
From:      Dariusz Kulinski <d.kulinski@gmail.com>
To:        Sergey Akifyev <asa@gascom.ru>
Cc:        FreeBSD ports <ports@freebsd.org>
Subject:   Re: FreeBSD Port: cups-base-1.1.20.0
Message-ID:  <af6622050410272048742dff8c@mail.gmail.com>
In-Reply-To: <1098427241.824.73.camel@localhost>
References:  <1294991121.20041020111018@takeda.tk> <1098427241.824.73.camel@localhost>

next in thread | previous in thread | raw e-mail | index | archive | help
> > There seems to be two vulnerabilities in CUPS, which still aren't
> > fixed:
> >
> > Affected package: cups-base-1.1.20.0
> > Type of problem: CUPS -- local information disclosure.
> > Reference: <http://www.FreeBSD.org/ports/portaudit/30cea6be-1d0c-11d9-814e-0001020eed82.html>;
> >
> > Affected package: cups-base-1.1.20.0
> > Type of problem: cups -- print queue browser denial-of-service.
> > Reference: <http://www.FreeBSD.org/ports/portaudit/05dcf751-0733-11d9-b45d-000c41e2cdad.html>;
> 
> I do not have time and Internet connection (email only for now). I'll
> try to fix this next week.

Affected package: cups-base-1.1.20.0
Type of problem: xpdf -- integer overflow vulnerabilities.
Reference: <http://www.FreeBSD.org/ports/portaudit/ad2f3337-26bf-11d9-9289-000c41e2cdad.html>;

It's seems that another vulnerability apppeared.

I was trying to upgrade that port by myself, but the way it's all
organized (splitted to several smaller ports) it makes it complicated
to me to do it.

I never upgraded port before, and I think cups it's not really easiest
to start with.

-- 
Dariusz Kulinski
www.takeda.tk



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?af6622050410272048742dff8c>