summaryrefslogtreecommitdiff
path: root/testing
diff options
context:
space:
mode:
authorPatrick J Volkerding <volkerdi@slackware.com>2020-04-28 20:18:40 +0000
committerEric Hameleers <alien@slackware.com>2020-04-29 08:59:53 +0200
commitfc35afb36c8162cb44fa7d9b72b8e3bed0cfe491 (patch)
tree43c1dc112d02f0974df977da8d9007c3461ff276 /testing
parent1cf9f87b65a9ec2c65a1fb409fe9e42a53af778f (diff)
downloadcurrent-fc35afb36c8162cb44fa7d9b72b8e3bed0cfe491.tar.gz
Tue Apr 28 20:18:40 UTC 202020200428201840
ap/cups-2.3.3-x86_64-1.txz: Upgraded. This update fixes two security issues: The ppdOpen function did not handle invalid UI constraint. ppdcSource::get_resolution function did not handle invalid resolution strings. The ippReadIO function may under-read an extension. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842 (* Security fix *) l/imagemagick-7.0.10_10-x86_64-1.txz: Upgraded. n/samba-4.12.2-x86_64-1.txz: Upgraded. This update fixes two security issues: A client combining the 'ASQ' and 'Paged Results' LDAP controls can cause a use-after-free in Samba's AD DC LDAP server. A deeply nested filter in an un-authenticated LDAP search can exhaust the LDAP server's stack memory causing a SIGSEGV. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10700 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10704 (* Security fix *) testing/packages/PAM/cups-2.3.3-x86_64-1_pam.txz: Upgraded. This update fixes two security issues: The ppdOpen function did not handle invalid UI constraint. ppdcSource::get_resolution function did not handle invalid resolution strings. The ippReadIO function may under-read an extension. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842 (* Security fix *) testing/packages/PAM/samba-4.12.2-x86_64-1_pam.txz: Upgraded. This update fixes two security issues: A client combining the 'ASQ' and 'Paged Results' LDAP controls can cause a use-after-free in Samba's AD DC LDAP server. A deeply nested filter in an un-authenticated LDAP search can exhaust the LDAP server's stack memory causing a SIGSEGV. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10700 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10704 (* Security fix *)
Diffstat (limited to 'testing')
-rw-r--r--testing/packages/PAM/cups-2.3.3-x86_64-1_pam.txt (renamed from testing/packages/PAM/cups-2.3.1-x86_64-1_pam.txt)0
-rw-r--r--testing/packages/PAM/samba-4.12.2-x86_64-1_pam.txt (renamed from testing/packages/PAM/samba-4.12.1-x86_64-1_pam.txt)0
2 files changed, 0 insertions, 0 deletions
diff --git a/testing/packages/PAM/cups-2.3.1-x86_64-1_pam.txt b/testing/packages/PAM/cups-2.3.3-x86_64-1_pam.txt
index f581115e..f581115e 100644
--- a/testing/packages/PAM/cups-2.3.1-x86_64-1_pam.txt
+++ b/testing/packages/PAM/cups-2.3.3-x86_64-1_pam.txt
diff --git a/testing/packages/PAM/samba-4.12.1-x86_64-1_pam.txt b/testing/packages/PAM/samba-4.12.2-x86_64-1_pam.txt
index e1800f15..e1800f15 100644
--- a/testing/packages/PAM/samba-4.12.1-x86_64-1_pam.txt
+++ b/testing/packages/PAM/samba-4.12.2-x86_64-1_pam.txt