summaryrefslogtreecommitdiffstats
path: root/testing/packages/PAM/cups-2.3.3-x86_64-1_pam.txt (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Tue Apr 28 20:18:40 UTC 202020200428201840 Patrick J Volkerding2020-04-291-0/+11
ap/cups-2.3.3-x86_64-1.txz: Upgraded. This update fixes two security issues: The ppdOpen function did not handle invalid UI constraint. ppdcSource::get_resolution function did not handle invalid resolution strings. The ippReadIO function may under-read an extension. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842 (* Security fix *) l/imagemagick-7.0.10_10-x86_64-1.txz: Upgraded. n/samba-4.12.2-x86_64-1.txz: Upgraded. This update fixes two security issues: A client combining the 'ASQ' and 'Paged Results' LDAP controls can cause a use-after-free in Samba's AD DC LDAP server. A deeply nested filter in an un-authenticated LDAP search can exhaust the LDAP server's stack memory causing a SIGSEGV. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10700 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10704 (* Security fix *) testing/packages/PAM/cups-2.3.3-x86_64-1_pam.txz: Upgraded. This update fixes two security issues: The ppdOpen function did not handle invalid UI constraint. ppdcSource::get_resolution function did not handle invalid resolution strings. The ippReadIO function may under-read an extension. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842 (* Security fix *) testing/packages/PAM/samba-4.12.2-x86_64-1_pam.txz: Upgraded. This update fixes two security issues: A client combining the 'ASQ' and 'Paged Results' LDAP controls can cause a use-after-free in Samba's AD DC LDAP server. A deeply nested filter in an un-authenticated LDAP search can exhaust the LDAP server's stack memory causing a SIGSEGV. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10700 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10704 (* Security fix *)