| Summary: | <net-print/cups-pdf-1.5.2: insecure creation of spoolfile | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Matthias Geerdsen (RETIRED) <vorlon> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | minor | CC: | printing |
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | All | ||
| URL: | http://cip.physik.uni-wuerzburg.de/~vrbehr/cups-pdf/ | ||
| Whiteboard: | B3 [noglsa] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Matthias Geerdsen (RETIRED)
2004-10-26 06:46:23 UTC
Printing, do you prefer to push 1.5.2 to x86 stable or upgrade everyone to 1.6.4 ? marked 1.5.2 stable on x86 and commited 1.6.4 as ~x86 Please vote on GLSA need so the question is whether or not 1.3.1 is vulnerable or if this is a bug unique to the 1.5.x series? Not only. It's also if this warrants a GLSA or not. B3 vulns needs a vote. Given the package profile, I would vote no. ok, I vote no as well. Closing without GLSA. |