Debian Package Tracker
Register | Log in
Subscribe

cups

Common UNIX Printing System(tm) - PPD/driver support, web interface

Choose email to subscribe with

general
  • source: cups (main)
  • version: 2.4.16-1
  • maintainer: Debian Printing Team (archive) (DMD) (LowNMU)
  • uploaders: Thorsten Alteholz [DMD] – Till Kamppeter [DMD]
  • arch: all any
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.3.3op2-3+deb11u8
  • o-o-sec: 2.3.3op2-3+deb11u10
  • o-o-p-u: 2.3.3op2-3+deb11u8
  • oldstable: 2.4.2-3+deb12u9
  • old-sec: 2.4.2-3+deb12u9
  • stable: 2.4.10-3+deb13u2
  • stable-sec: 2.4.10-3+deb13u1
  • testing: 2.4.16-1
  • unstable: 2.4.16-1
versioned links
  • 2.3.3op2-3+deb11u8: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.3.3op2-3+deb11u10: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.4.2-3+deb12u9: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.4.10-3+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.4.10-3+deb13u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.4.16-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • cups (37 bugs: 1, 25, 11, 0)
  • cups-bsd (1 bugs: 0, 1, 0, 0)
  • cups-client (2 bugs: 0, 2, 0, 0)
  • cups-common
  • cups-core-drivers (2 bugs: 0, 2, 0, 0)
  • cups-daemon (19 bugs: 0, 13, 6, 0)
  • cups-ipp-utils
  • cups-ppdc
  • cups-server-common
  • libcups2-dev (2 bugs: 0, 2, 0, 0)
  • libcups2t64 (2 bugs: 0, 2, 0, 0)
  • libcupsimage2-dev
  • libcupsimage2t64
action needed
7 security issues in trixie high

There are 7 open security issues in trixie.

2 important issues:
  • CVE-2026-34979: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, there is a heap-based buffer overflow in the CUPS scheduler when building filter option strings from job attribute. At time of publication, there are no publicly available patches.
  • CVE-2026-34980: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, in a network-exposed cupsd with a shared target queue, an unauthorized client can send a Print-Job to that shared PostScript queue without authentication. The server accepts a page-border value supplied as textWithoutLanguage, preserves an embedded newline through option escaping and reparse, and then reparses the resulting second-line PPD: text as a trusted scheduler control record. A follow-up raw print job can therefore make the server execute an attacker-chosen existing binary such as /usr/bin/vim as lp. At time of publication, there are no publicly available patches.
5 issues left for the package maintainer to handle:
  • CVE-2025-58436: (needs triaging) OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable by other clients. This issue has been patched in version 2.4.15.
  • CVE-2025-61915: (needs triaging) OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a user in the lpadmin group can use the cups web ui to change the config and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write. This issue has been patched in version 2.4.15.
  • CVE-2026-27447: (needs triaging) OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, CUPS daemon (cupsd) contains an authorization bypass vulnerability due to case-insensitive username comparison during authorization checks. The vulnerability allows an unprivileged user to gain unauthorized access to restricted operations by using a user with a username that differs only in case from an authorized user. At time of publication, there are no publicly available patches.
  • CVE-2026-34978: (needs triaging) OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, the RSS notifier allows .. path traversal in notify-recipient-uri (e.g., rss:///../job.cache), letting a remote IPP client write RSS XML bytes outside CacheDir/rss (anywhere that is lp-writable). In particular, because CacheDir is group-writable by default (typically root:lp and mode 0770), the notifier (running as lp) can replace root-managed state files via temp-file + rename(). This PoC clobbers CacheDir/job.cache with RSS XML, and after restarting cupsd the scheduler fails to parse the job cache and previously queued jobs disappear. At time of publication, there are no publicly available patches.
  • CVE-2026-34990: (needs triaging) OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with a reusable Authorization: Local ... token. That token is enough to drive /admin/ requests on localhost, and the attacker can combine CUPS-Create-Local-Printer with printer-is-shared=true to persist a file:///... queue even though the normal FileDevice policy rejects such URIs. Printing to that queue gives an arbitrary root file overwrite; the PoC below uses that primitive to drop a sudoers fragment and demonstrate root command execution. At time of publication, there are no publicly available patches.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-11-28 Last update: 2026-04-04 18:30
5 security issues in sid high

There are 5 open security issues in sid.

5 important issues:
  • CVE-2026-27447: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, CUPS daemon (cupsd) contains an authorization bypass vulnerability due to case-insensitive username comparison during authorization checks. The vulnerability allows an unprivileged user to gain unauthorized access to restricted operations by using a user with a username that differs only in case from an authorized user. At time of publication, there are no publicly available patches.
  • CVE-2026-34978: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, the RSS notifier allows .. path traversal in notify-recipient-uri (e.g., rss:///../job.cache), letting a remote IPP client write RSS XML bytes outside CacheDir/rss (anywhere that is lp-writable). In particular, because CacheDir is group-writable by default (typically root:lp and mode 0770), the notifier (running as lp) can replace root-managed state files via temp-file + rename(). This PoC clobbers CacheDir/job.cache with RSS XML, and after restarting cupsd the scheduler fails to parse the job cache and previously queued jobs disappear. At time of publication, there are no publicly available patches.
  • CVE-2026-34979: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, there is a heap-based buffer overflow in the CUPS scheduler when building filter option strings from job attribute. At time of publication, there are no publicly available patches.
  • CVE-2026-34980: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, in a network-exposed cupsd with a shared target queue, an unauthorized client can send a Print-Job to that shared PostScript queue without authentication. The server accepts a page-border value supplied as textWithoutLanguage, preserves an embedded newline through option escaping and reparse, and then reparses the resulting second-line PPD: text as a trusted scheduler control record. A follow-up raw print job can therefore make the server execute an attacker-chosen existing binary such as /usr/bin/vim as lp. At time of publication, there are no publicly available patches.
  • CVE-2026-34990: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with a reusable Authorization: Local ... token. That token is enough to drive /admin/ requests on localhost, and the attacker can combine CUPS-Create-Local-Printer with printer-is-shared=true to persist a file:///... queue even though the normal FileDevice policy rejects such URIs. Printing to that queue gives an arbitrary root file overwrite; the PoC below uses that primitive to drop a sudoers fragment and demonstrate root command execution. At time of publication, there are no publicly available patches.
Created: 2026-04-04 Last update: 2026-04-04 18:30
5 security issues in forky high

There are 5 open security issues in forky.

5 important issues:
  • CVE-2026-27447: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, CUPS daemon (cupsd) contains an authorization bypass vulnerability due to case-insensitive username comparison during authorization checks. The vulnerability allows an unprivileged user to gain unauthorized access to restricted operations by using a user with a username that differs only in case from an authorized user. At time of publication, there are no publicly available patches.
  • CVE-2026-34978: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, the RSS notifier allows .. path traversal in notify-recipient-uri (e.g., rss:///../job.cache), letting a remote IPP client write RSS XML bytes outside CacheDir/rss (anywhere that is lp-writable). In particular, because CacheDir is group-writable by default (typically root:lp and mode 0770), the notifier (running as lp) can replace root-managed state files via temp-file + rename(). This PoC clobbers CacheDir/job.cache with RSS XML, and after restarting cupsd the scheduler fails to parse the job cache and previously queued jobs disappear. At time of publication, there are no publicly available patches.
  • CVE-2026-34979: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, there is a heap-based buffer overflow in the CUPS scheduler when building filter option strings from job attribute. At time of publication, there are no publicly available patches.
  • CVE-2026-34980: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, in a network-exposed cupsd with a shared target queue, an unauthorized client can send a Print-Job to that shared PostScript queue without authentication. The server accepts a page-border value supplied as textWithoutLanguage, preserves an embedded newline through option escaping and reparse, and then reparses the resulting second-line PPD: text as a trusted scheduler control record. A follow-up raw print job can therefore make the server execute an attacker-chosen existing binary such as /usr/bin/vim as lp. At time of publication, there are no publicly available patches.
  • CVE-2026-34990: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with a reusable Authorization: Local ... token. That token is enough to drive /admin/ requests on localhost, and the attacker can combine CUPS-Create-Local-Printer with printer-is-shared=true to persist a file:///... queue even though the normal FileDevice policy rejects such URIs. Printing to that queue gives an arbitrary root file overwrite; the PoC below uses that primitive to drop a sudoers fragment and demonstrate root command execution. At time of publication, there are no publicly available patches.
Created: 2026-04-04 Last update: 2026-04-04 18:30
7 security issues in bullseye high

There are 7 open security issues in bullseye.

5 important issues:
  • CVE-2026-27447: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, CUPS daemon (cupsd) contains an authorization bypass vulnerability due to case-insensitive username comparison during authorization checks. The vulnerability allows an unprivileged user to gain unauthorized access to restricted operations by using a user with a username that differs only in case from an authorized user. At time of publication, there are no publicly available patches.
  • CVE-2026-34978: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, the RSS notifier allows .. path traversal in notify-recipient-uri (e.g., rss:///../job.cache), letting a remote IPP client write RSS XML bytes outside CacheDir/rss (anywhere that is lp-writable). In particular, because CacheDir is group-writable by default (typically root:lp and mode 0770), the notifier (running as lp) can replace root-managed state files via temp-file + rename(). This PoC clobbers CacheDir/job.cache with RSS XML, and after restarting cupsd the scheduler fails to parse the job cache and previously queued jobs disappear. At time of publication, there are no publicly available patches.
  • CVE-2026-34979: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, there is a heap-based buffer overflow in the CUPS scheduler when building filter option strings from job attribute. At time of publication, there are no publicly available patches.
  • CVE-2026-34980: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, in a network-exposed cupsd with a shared target queue, an unauthorized client can send a Print-Job to that shared PostScript queue without authentication. The server accepts a page-border value supplied as textWithoutLanguage, preserves an embedded newline through option escaping and reparse, and then reparses the resulting second-line PPD: text as a trusted scheduler control record. A follow-up raw print job can therefore make the server execute an attacker-chosen existing binary such as /usr/bin/vim as lp. At time of publication, there are no publicly available patches.
  • CVE-2026-34990: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with a reusable Authorization: Local ... token. That token is enough to drive /admin/ requests on localhost, and the attacker can combine CUPS-Create-Local-Printer with printer-is-shared=true to persist a file:///... queue even though the normal FileDevice policy rejects such URIs. Printing to that queue gives an arbitrary root file overwrite; the PoC below uses that primitive to drop a sudoers fragment and demonstrate root command execution. At time of publication, there are no publicly available patches.
2 issues postponed or untriaged:
  • CVE-2025-58436: (postponed; to be fixed through a stable update) OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable by other clients. This issue has been patched in version 2.4.15.
  • CVE-2025-61915: (postponed; to be fixed through a stable update) OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a user in the lpadmin group can use the cups web ui to change the config and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write. This issue has been patched in version 2.4.15.
Created: 2026-04-04 Last update: 2026-04-04 18:30
7 security issues in bookworm high

There are 7 open security issues in bookworm.

2 important issues:
  • CVE-2026-34979: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, there is a heap-based buffer overflow in the CUPS scheduler when building filter option strings from job attribute. At time of publication, there are no publicly available patches.
  • CVE-2026-34980: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, in a network-exposed cupsd with a shared target queue, an unauthorized client can send a Print-Job to that shared PostScript queue without authentication. The server accepts a page-border value supplied as textWithoutLanguage, preserves an embedded newline through option escaping and reparse, and then reparses the resulting second-line PPD: text as a trusted scheduler control record. A follow-up raw print job can therefore make the server execute an attacker-chosen existing binary such as /usr/bin/vim as lp. At time of publication, there are no publicly available patches.
5 issues left for the package maintainer to handle:
  • CVE-2025-58436: (needs triaging) OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable by other clients. This issue has been patched in version 2.4.15.
  • CVE-2025-61915: (needs triaging) OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a user in the lpadmin group can use the cups web ui to change the config and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write. This issue has been patched in version 2.4.15.
  • CVE-2026-27447: (needs triaging) OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, CUPS daemon (cupsd) contains an authorization bypass vulnerability due to case-insensitive username comparison during authorization checks. The vulnerability allows an unprivileged user to gain unauthorized access to restricted operations by using a user with a username that differs only in case from an authorized user. At time of publication, there are no publicly available patches.
  • CVE-2026-34978: (needs triaging) OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, the RSS notifier allows .. path traversal in notify-recipient-uri (e.g., rss:///../job.cache), letting a remote IPP client write RSS XML bytes outside CacheDir/rss (anywhere that is lp-writable). In particular, because CacheDir is group-writable by default (typically root:lp and mode 0770), the notifier (running as lp) can replace root-managed state files via temp-file + rename(). This PoC clobbers CacheDir/job.cache with RSS XML, and after restarting cupsd the scheduler fails to parse the job cache and previously queued jobs disappear. At time of publication, there are no publicly available patches.
  • CVE-2026-34990: (needs triaging) OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with a reusable Authorization: Local ... token. That token is enough to drive /admin/ requests on localhost, and the attacker can combine CUPS-Create-Local-Printer with printer-is-shared=true to persist a file:///... queue even though the normal FileDevice policy rejects such URIs. Printing to that queue gives an arbitrary root file overwrite; the PoC below uses that primitive to drop a sudoers fragment and demonstrate root command execution. At time of publication, there are no publicly available patches.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-11-28 Last update: 2026-04-04 18:30
debian/patches: 1 patch with invalid metadata, 3 patches to forward upstream high

Among the 13 debian patches available in version 2.4.16-1 of the package, we noticed the following issues:

  • 1 patch with invalid metadata that ought to be fixed.
  • 3 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-12-04 21:02
11 bugs tagged patch in the BTS normal
The BTS contains patches fixing 11 bugs (12 if counting merged bugs), consider including or untagging them.
Created: 2026-03-31 Last update: 2026-04-04 21:17
version in VCS is newer than in repository, is it time to upload? normal
vcswatch reports that this package seems to have a new changelog entry (version 2.4.16-1.1, distribution UNRELEASED) and new commits in its VCS. You should consider whether it's time to make an upload.

Here are the relevant commit messages:
commit 9170c0a83b192e2e50ce8b61355a8d6d03156e7f
Author: Helge Kreutzmann <debian@helgefjell.de>
Date:   Thu Dec 4 18:45:09 2025 +0100

    Update German man page (2229t)
Created: 2025-12-04 Last update: 2026-04-01 22:30
5 open merge requests in Salsa normal
There are 5 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-09-20 Last update: 2026-01-25 22:00
lintian reports 6 warnings normal
Lintian reports 6 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-11-28 Last update: 2025-12-04 21:01
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2020-02-26 Last update: 2025-10-07 21:03
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.6.2).
Created: 2024-04-07 Last update: 2026-03-31 15:01
news
[rss feed]
  • [2025-12-07] cups 2.4.16-1 MIGRATED to testing (Debian testing watch)
  • [2025-12-04] Accepted cups 2.4.16-1 (source) into unstable (Thorsten Alteholz)
  • [2025-11-30] cups 2.4.15-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-27] Accepted cups 2.4.15-1 (source) into unstable (Thorsten Alteholz)
  • [2025-11-07] Accepted cups 2.4.10-3+deb13u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Thorsten Alteholz)
  • [2025-10-09] cups 2.4.14-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-04] Accepted cups 2.4.14-1 (source) into unstable (Thorsten Alteholz)
  • [2025-09-18] cups 2.4.10-4 MIGRATED to testing (Debian testing watch)
  • [2025-09-15] Accepted cups 2.4.10-3+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Thorsten Alteholz)
  • [2025-09-12] Accepted cups 2.4.2-3+deb12u9 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Thorsten Alteholz)
  • [2025-09-11] Accepted cups 2.4.2-3+deb12u9 (source) into oldstable-security (Debian FTP Masters) (signed by: Thorsten Alteholz)
  • [2025-09-11] Accepted cups 2.4.10-3+deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Thorsten Alteholz)
  • [2025-09-11] Accepted cups 2.3.3op2-3+deb11u10 (source) into oldoldstable-security (Thorsten Alteholz)
  • [2025-09-11] Accepted cups 2.4.10-4 (source) into unstable (Thorsten Alteholz)
  • [2025-06-07] cups 2.4.10-3 MIGRATED to testing (Debian testing watch)
  • [2025-06-01] Accepted cups 2.4.10-3 (source) into unstable (Thorsten Alteholz)
  • [2024-10-06] Accepted cups 2.4.2-3+deb12u8 (source) into proposed-updates (Debian FTP Masters) (signed by: Thorsten Alteholz)
  • [2024-10-03] cups 2.4.10-2 MIGRATED to testing (Debian testing watch)
  • [2024-09-29] Accepted cups 2.3.3op2-3+deb11u9 (source) into oldstable-security (Thorsten Alteholz)
  • [2024-09-29] Accepted cups 2.4.2-3+deb12u8 (source) into stable-security (Debian FTP Masters) (signed by: Thorsten Alteholz)
  • [2024-09-27] Accepted cups 2.4.10-2 (source) into unstable (Thorsten Alteholz)
  • [2024-07-01] Accepted cups 2.4.2-3+deb12u7 (source) into proposed-updates (Debian FTP Masters) (signed by: Thorsten Alteholz)
  • [2024-06-29] Accepted cups 2.3.3op2-3+deb11u8 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Thorsten Alteholz)
  • [2024-06-25] cups 2.4.10-1 MIGRATED to testing (Debian testing watch)
  • [2024-06-22] Accepted cups 2.4.10-1 (source) into unstable (Thorsten Alteholz)
  • [2024-06-22] Accepted cups 2.3.3op2-3+deb11u7 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Thorsten Alteholz)
  • [2024-06-22] Accepted cups 2.4.2-3+deb12u6 (source) into proposed-updates (Debian FTP Masters) (signed by: Thorsten Alteholz)
  • [2024-06-21] cups 2.4.7-3 MIGRATED to testing (Debian testing watch)
  • [2024-06-21] cups 2.4.7-3 MIGRATED to testing (Debian testing watch)
  • [2024-06-16] Accepted cups 2.4.7-3 (source) into unstable (Thorsten Alteholz)
  • 1
  • 2
bugs [bug history graph]
  • all: 70 73
  • RC: 1
  • I&N: 51 52
  • M&W: 18 20
  • F&P: 0
  • patch: 11 12
links
  • homepage
  • lintian (0, 6)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (99, 48)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.4.16-1ubuntu1
  • 447 bugs (5 patches)
  • patches for 2.4.16-1ubuntu1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing