Пакет cups-printerapp-1:2.4.10-11.el10_0.1.aarch64
Имя | cups-printerapp |
---|---|
Эпоха | 1 |
Версия | 2.4.10 |
Релиз | 11.el10_0.1 |
Архитектура | aarch64 |
Сайт | https://openprinting.github.io/cups/ |
Лицензия | Apache-2.0 WITH LLVM-exception AND BSD-3-Clause AND Zlib AND BSD-2-Clause |
Время сборки | 2025-09-12 09:06:27 |
Хост сборки | builder-arm64-1.inferitos.ru |
Краткое описание | CUPS printing system - tools for printer application |
Репозитории | AppStream |
Полное описание | Provides IPP everywhere printer application ippeveprinter and tools for printing PostScript and HP PCL document formats - ippevepcl and ippeveps. The printer application enables older printers for IPP everywhere standard - so if older printer is installed with a printer application, its print queue acts as IPP everywhere printer to CUPS daemon. This solution will substitute printer drivers and raw queues in the future. |
Эррата | — |
Размер | 114 КиБ |
Исходный проект | cups-2.4.10-11.el10_0.1 |
Контрольная сумма SHA-256 | 8def7f4d4078fc73159938f9558f312ea1bf14cf918b64c00f3bd4eb314b326d |
×
* Fri Sep 12 2025 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 1:2.4.10-11.1 - Rebuilt for MSVSphere 10 * Fri Sep 05 2025 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-11.1 - RHEL-113075 CVE-2025-58364 cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS * Thu Sep 04 2025 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-11.1 - RHEL-112421 CVE-2025-58060 cups: Authentication Bypass in CUPS Authorization Handling * Tue Jan 07 2025 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-11 - provide a way how to opt-out from system crypto policy if needed * Fri Dec 06 2024 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-10 - RHEL-68415 Inability to disable weak ciphers in CUPS configuration * Mon Dec 02 2024 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-9 - RHEL-69638 IPP Everywhere permanent queue is not removed if PPD generation fails * Mon Nov 25 2024 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-8 - RHEL-45525 cups-2.4.10-2.el10: RHEL SAST Automation: address 1 High impact true positive(s) - RHEL-60354 CVE-2024-47175 cups: remote command injection via attacker controlled data in PPD file * Fri Nov 22 2024 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-8 - RHEL-54579 [rhel-10] Do not look into /root/.cups/lpoptions when using cupsGetNamedDest as root * Thu Nov 14 2024 Zdenek Dohnal <zdohnal@redhat.com> - 1:2.4.10-7 - RHEL-67580 Move /etc/cups/ssl into cups-filesystem and require filesystem in libs * Tue Oct 29 2024 Troy Dawson <tdawson@redhat.com> - 1:2.4.10-6 - Bump release for October 2024 mass rebuild: Resolves: RHEL-64018