./print/cups-filters, Backends, filters, and other software for cups

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: pkgsrc-2015Q2, Version: 1.0.71, Package name: cups-filters-1.0.71, Maintainer: pkgsrc-users

CUPS is a standards-based, open source printing system developed
by Apple Inc. for Mac OS X and other UNIX-like operating systems.
CUPS uses the Internet Printing Protocol ("IPP") and provides System
V and Berkeley command-line interfaces, a web interface, and a C
API to manage printers and print jobs.

This distribution contains backends, filters, and other software
that was once part of the core CUPS distribution but is no longer
maintained by Apple Inc. In addition it contains additional filters
and software developed independently of Apple, especially filters
for the PDF-centric printing workflow introduced by OpenPrinting
and a daemon to browse Bonjour broadcasts of remote CUPS printers
and makes these printers available locally.

From CUPS 1.6.0 on, this package is required for using printer
drivers with CUPS under Linux. With CUPS 1.5.x and earlier this
package can be used optionally to switch over to PDF-based printing.
In that case some filters are provided by both CUPS and this package.
Then the filters of this package should be used.


Required to run:
[shells/bash] [net/avahi] [fonts/fontconfig] [graphics/lcms2] [graphics/png] [graphics/tiff] [graphics/freetype2] [print/poppler-glib] [print/poppler-utils] [print/cups] [print/ghostscript] [print/ijs] [print/poppler-cpp] [print/qpdf] [devel/glib2]

Required to build:
[print/poppler-includes] [x11/xextproto] [x11/inputproto] [x11/renderproto] [x11/compositeproto] [x11/xf86vidmodeproto] [x11/fixesproto4] [x11/glproto] [x11/randrproto] [x11/xf86driproto] [x11/xproto] [x11/xcb-proto] [x11/damageproto] [x11/dri2proto] [pkgtools/x11-links]

Master sites:

SHA1: c08258c086d4a6edf5869fc29676280ad0c22b27
RMD160: c5da92ce803f156b60e8b08bf1251fa1d06c315b
Filesize: 1307.73 KB

Version history: (Expand)


CVS history: (Expand)


   2015-07-08 21:47:19 by Matthias Scheler | Files touched by this commit (4) | Package updated
Log message:
Pullup ticket #4757 - requested by wiz
print/cups-filters: security update

Revisions pulled up:
- print/cups-filters/Makefile                                   1.23-1.24
- print/cups-filters/distinfo                                   1.18-1.19
- print/cups-filters/patches/patch-configure.ac                 deleted
- print/cups-filters/patches/patch-filter_foomatic-rip_foomaticrip.c deleted

---
   Module Name:	pkgsrc
   Committed By:	wiz
   Date:		Wed Jul  1 15:31:34 UTC 2015

   Modified Files:
   	pkgsrc/print/cups-filters: Makefile distinfo
   Removed Files:
   	pkgsrc/print/cups-filters/patches: patch-configure.ac
   	    patch-filter_foomatic-rip_foomaticrip.c

   Log message:
   Update to 1.0.70, provided by Leonardo Taccari in PR 50013:

   Changes:
   - texttopdf: Fixed buffer overflow on size allocation of texttopdf
     when working with extremely small line sizes, which causes the size
     calculation to result in 0 (CVE-2015-3258, thanks to Stefan
     Cornelius fro Red Hat for the patch).
   - cups-browsed: leak fixes
   - cups-browsed: Further BrowseAllow fixing
   - cups-browsed: BrowsePoll is an array of pointers, not structures,
     so allocate room for the pointers
     - cups-browsed: Prevent NULL dereference when handling BrowseAllow
     without value
     - cups-browsed: Use memory deallocation function corresponding to
     allocation function used
   - cups-browsed: Fixes for glib source handling (Red Hat bug #1228555)
   - foomatic-rip: Allow using another shell than /bin/bash using the
     "--with-shell=..." option for "./configure". Thanks to \ 
Leonardo
     Taccari for the patch (Bug #1288).

---
   Module Name:	pkgsrc
   Committed By:	wiz
   Date:		Fri Jul  3 12:25:13 UTC 2015

   Modified Files:
   	pkgsrc/print/cups-filters: Makefile distinfo

   Log message:
   Update to 1.0.71:

   CHANGES IN V1.0.71

     	- texttopdf: The Page allocation is moved into textcommon.c, where it
   	  does all the necessary checking: lower-bounds for CVE-2015-3258 and
   	  upper-bounds for CVE-2015-3259 due to integer overflows for the
   	  calloc() call initialising Page[0] and the memset() call in
   	  texttopdf.c's WritePage() function zeroing the entire array. Thanks
   	  to Tim Waugh from Red Hat for the patch.
   	- texttopdf: Upper-bounds checking (CVE-2015-3259).