Slackware alert SSA:2023-264-02 (cups)
From: | Slackware Security Team <security@slackware.com> | |
To: | slackware-security@slackware.com | |
Subject: | [slackware-security] cups (SSA:2023-264-02) | |
Date: | Thu, 21 Sep 2023 12:43:00 -0700 | |
Message-ID: | <alpine.LNX.2.02.2309211242450.22054@connie.slackware.com> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] cups (SSA:2023-264-02) New cups packages are available for Slackware 14.2, 15.0, and -current to fix a security issue. Here are the details from the Slackware 15.0 ChangeLog: +--------------------------+ patches/packages/cups-2.4.7-i586-1_slack15.0.txz: Upgraded. This update fixes bugs and a security issue: Fixed Heap-based buffer overflow when reading Postscript in PPD files. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-4504 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patc... Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/pa... Updated package for Slackware 15.0: ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patc... Updated package for Slackware x86_64 15.0: ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/pa... Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/s... Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current... MD5 signatures: +-------------+ Slackware 14.2 package: 305c9c88c13fe970dee373e1c03790de cups-2.1.4-i586-5_slack14.2.txz Slackware x86_64 14.2 package: a0021743e71ae2004355463ee97c6ae1 cups-2.1.4-x86_64-5_slack14.2.txz Slackware 15.0 package: 390c5fd0cdfc442d5815d77556c7557f cups-2.4.7-i586-1_slack15.0.txz Slackware x86_64 15.0 package: ab6b5714f764b5eddea6251aaffca847 cups-2.4.7-x86_64-1_slack15.0.txz Slackware -current package: bc8c53632efade8b30849665ab7926d3 ap/cups-2.4.7-i586-1.txz Slackware x86_64 -current package: ee63ee5e653efa7f6a5335b110ec1541 ap/cups-2.4.7-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg cups-2.4.7-i586-1_slack15.0.txz Then, restart the cups server: # sh /etc/rc.d/rc.cups restart +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- iEYEARECAAYFAmUMm3cACgkQakRjwEAQIjMqnwCeIWT/rTm9RUwgWrEt9uftol+n 0fwAn0BkVWsNX7Ys/NoTI+PvpyR+nIRa =/E0i -----END PGP SIGNATURE-----