summaryrefslogtreecommitdiffstats
path: root/COPYING
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2023-06-02 20:56:35 +0000
committer Eric Hameleers <alien@slackware.com>2023-06-03 13:30:32 +0200
commit3f544e903a450a5d34f6fa71212a4a8d4a277e67 (patch)
treec3f40790bbd25428b4cd841d5a2df3167f2cb2fc /COPYING
parentf33a393b0f5440b4b2cc9c0932b6205f86463fb4 (diff)
downloadcurrent-3f544e903a450a5d34f6fa71212a4a8d4a277e67.tar.gz
current-3f544e903a450a5d34f6fa71212a4a8d4a277e67.tar.xz
Fri Jun 2 20:56:35 UTC 202320230602205635_15.0
patches/packages/cups-2.4.3-x86_64-1_slack15.0.txz: Upgraded. Fixed a heap buffer overflow in _cups_strlcpy(), when the configuration file cupsd.conf sets the value of loglevel to DEBUG, that could allow a remote attacker to launch a denial of service (DoS) attack, or possibly execute arbirary code. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-32324 (* Security fix *) patches/packages/ntp-4.2.8p16-x86_64-1_slack15.0.txz: Upgraded. This update fixes bugs and security issues. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-26551 https://www.cve.org/CVERecord?id=CVE-2023-26552 https://www.cve.org/CVERecord?id=CVE-2023-26553 https://www.cve.org/CVERecord?id=CVE-2023-26554 https://www.cve.org/CVERecord?id=CVE-2023-26555 (* Security fix *)
Diffstat (limited to 'COPYING')
0 files changed, 0 insertions, 0 deletions