Debian Package Tracker
Register | Log in
Subscribe

slic3r-prusa

G-code generator for 3D printers

Choose email to subscribe with

general
  • source: slic3r-prusa (main)
  • version: 2.9.2+dfsg-1
  • maintainer: Debian 3-D Printing Packages (archive) (DMD)
  • uploaders: Chow Loong Jin [DMD]
  • arch: any
  • std-ver: 4.1.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.39.2+dfsg-1
  • oldstable: 2.3.0+dfsg-1
  • stable: 2.5.0+dfsg-4
  • testing: 2.9.2+dfsg-1
  • unstable: 2.9.2+dfsg-1
versioned links
  • 1.39.2+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.3.0+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.5.0+dfsg-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.9.2+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • prusa-slicer (5 bugs: 0, 3, 2, 0)
action needed
Debci reports failed tests high
  • unstable: fail (log)
    The tests ran in 0:01:32
    Last run: 2025-05-13T11:04:35.000Z
    Previous status: unknown

  • testing: fail (log)
    The tests ran in 0:02:15
    Last run: 2025-05-21T14:07:22.000Z
    Previous status: unknown

Created: 2025-04-16 Last update: 2025-05-23 21:35
4 security issues in sid high

There are 4 open security issues in sid.

4 important issues:
  • CVE-2020-28594: A use-after-free vulnerability exists in the _3MF_Importer::_handle_end_model() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted 3MF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2020-28595: An out-of-bounds write vulnerability exists in the Obj.cpp load_obj() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted obj file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2020-28596: A stack-based buffer overflow vulnerability exists in the Objparser::objparse() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted obj file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2020-28598: An out-of-bounds write vulnerability exists in the Admesh stl_fix_normal_directions() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted AMF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
Created: 2024-06-02 Last update: 2025-04-21 13:00
4 security issues in buster high

There are 4 open security issues in buster.

4 important issues:
  • CVE-2020-28594: A use-after-free vulnerability exists in the _3MF_Importer::_handle_end_model() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted 3MF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2020-28595: An out-of-bounds write vulnerability exists in the Obj.cpp load_obj() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted obj file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2020-28596: A stack-based buffer overflow vulnerability exists in the Objparser::objparse() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted obj file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2020-28598: An out-of-bounds write vulnerability exists in the Admesh stl_fix_normal_directions() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted AMF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
Created: 2024-06-02 Last update: 2024-06-28 15:00
AppStream hints: 2 errors and 2 warnings high
AppStream found metadata issues for packages:
  • prusa-slicer: 2 errors and 2 warnings
You should get rid of them to provide more metadata about this software.
Created: 2018-06-04 Last update: 2022-09-23 17:01
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2025-01-06 Last update: 2025-05-23 21:31
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2025-04-15 Last update: 2025-05-23 19:30
lintian reports 2 warnings normal
Lintian reports 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-03-13 Last update: 2025-04-11 03:31
4 low-priority security issues in bookworm low

There are 4 open security issues in bookworm.

4 issues left for the package maintainer to handle:
  • CVE-2020-28594: (postponed; to be fixed through a stable update) A use-after-free vulnerability exists in the _3MF_Importer::_handle_end_model() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted 3MF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2020-28595: (postponed; to be fixed through a stable update) An out-of-bounds write vulnerability exists in the Obj.cpp load_obj() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted obj file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2020-28596: (postponed; to be fixed through a stable update) A stack-based buffer overflow vulnerability exists in the Objparser::objparse() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted obj file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2020-28598: (postponed; to be fixed through a stable update) An out-of-bounds write vulnerability exists in the Admesh stl_fix_normal_directions() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted AMF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.

You can find information about how to handle these issues in the security team's documentation.

Created: 2024-06-02 Last update: 2025-04-21 13:00
debian/patches: 14 patches to forward upstream low

Among the 16 debian patches available in version 2.9.2+dfsg-1 of the package, we noticed the following issues:

  • 14 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-04-12 18:03
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2024-04-26 Last update: 2025-01-10 03:00
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2024-10-08 Last update: 2024-10-08 18:00
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.1.1).
Created: 2018-01-23 Last update: 2025-04-12 17:56
news
[rss feed]
  • [2025-04-15] slic3r-prusa 2.9.2+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2025-04-12] Accepted slic3r-prusa 2.9.2+dfsg-1 (source) into unstable (Chow Loong Jin)
  • [2025-03-12] Accepted slic3r-prusa 2.9.1+dfsg-1 (source) into unstable (Chow Loong Jin)
  • [2025-01-09] Accepted slic3r-prusa 2.9.0+dfsg-1 (source) into unstable (Chow Loong Jin)
  • [2024-10-08] Accepted slic3r-prusa 2.8.1+dfsg2-2 (source) into unstable (Chow Loong Jin)
  • [2024-10-07] Accepted slic3r-prusa 2.8.1+dfsg2-1 (source) into unstable (Chow Loong Jin)
  • [2024-07-05] Accepted slic3r-prusa 2.8.0+dfsg-1 (source) into unstable (Chow Loong Jin)
  • [2024-06-21] Accepted slic3r-prusa 2.7.5~rc1+dfsg-1 (source) into unstable (Chow Loong Jin)
  • [2024-05-26] Accepted slic3r-prusa 2.7.4+dfsg-1.1 (source) into unstable (Tobias Frost)
  • [2024-04-22] Accepted slic3r-prusa 2.7.4+dfsg-1 (source) into unstable (Chow Loong Jin)
  • [2024-03-09] Accepted slic3r-prusa 2.7.2+dfsg-1 (source) into unstable (Chow Loong Jin)
  • [2024-01-09] Accepted slic3r-prusa 2.7.1+dfsg-1 (source) into unstable (Chow Loong Jin)
  • [2023-12-02] slic3r-prusa REMOVED from testing (Debian testing watch)
  • [2023-11-30] Accepted slic3r-prusa 2.6.1+dfsg-4.1 (source) into unstable (Aaron Rainbolt) (signed by: Simon Quigley)
  • [2023-11-16] Accepted slic3r-prusa 2.6.1+dfsg-4 (source) into unstable (Chow Loong Jin)
  • [2023-10-05] slic3r-prusa 2.6.1+dfsg-3 MIGRATED to testing (Debian testing watch)
  • [2023-09-28] Accepted slic3r-prusa 2.6.1+dfsg-3 (source) into unstable (Chow Loong Jin)
  • [2023-09-27] Accepted slic3r-prusa 2.6.1+dfsg-2 (source) into unstable (Chow Loong Jin)
  • [2023-09-12] Accepted slic3r-prusa 2.6.1+dfsg-1 (source) into unstable (Chow Loong Jin)
  • [2023-08-22] Accepted slic3r-prusa 2.6.0+dfsg-3 (source) into unstable (Chow Loong Jin)
  • [2023-07-25] Accepted slic3r-prusa 2.6.0+dfsg-2 (source) into unstable (Chow Loong Jin)
  • [2023-07-20] Accepted slic3r-prusa 2.6.0+dfsg-1 (source) into unstable (Chow Loong Jin)
  • [2023-06-16] slic3r-prusa 2.5.2+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2023-04-27] Accepted slic3r-prusa 2.5.2+dfsg-1 (source) into unstable (Chow Loong Jin)
  • [2023-01-28] slic3r-prusa 2.5.0+dfsg-4 MIGRATED to testing (Debian testing watch)
  • [2023-01-05] Accepted slic3r-prusa 2.5.0+dfsg-4 (source) into unstable (Chow Loong Jin)
  • [2022-12-09] Accepted slic3r-prusa 2.5.0+dfsg-3 (source) into unstable (Chow Loong Jin)
  • [2022-10-12] Accepted slic3r-prusa 2.5.0+dfsg-2 (source) into unstable (Chow Loong Jin)
  • [2022-09-23] Accepted slic3r-prusa 2.5.0+dfsg-1 (source) into unstable (Chow Loong Jin)
  • [2022-04-29] Accepted slic3r-prusa 2.4.2+dfsg-1 (source) into unstable (Chow Loong Jin)
  • 1
  • 2
bugs [bug history graph]
  • all: 9
  • RC: 0
  • I&N: 5
  • M&W: 4
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian (0, 2)
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 77)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.9.2+dfsg-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing