[CLSA-2023:1697576053] Fix CVE(s): CVE-2023-4504
Type:
security
Severity:
Important
Release date:
2023-10-17 20:54:17 UTC
Description:
* SECURITY UPDATE: heap-based buffer overflow - debian/patches/CVE-2023-4504.patch: check for end of buffer if there is an escaped character - CVE-2023-4504
Updated packages:
  • cups_2.2.7-1ubuntu2.10+tuxcare.els2_amd64.deb
    sha:53eab00527781278f60e01caf030a7b4f6c260b7
  • cups-bsd_2.2.7-1ubuntu2.10+tuxcare.els2_amd64.deb
    sha:d1e6a334ae7fd07b4d72f1d5b8413247c53414ad
  • cups-client_2.2.7-1ubuntu2.10+tuxcare.els2_amd64.deb
    sha:17104dee7f87159b4538b6a3a2b9d1da3b6405de
  • cups-common_2.2.7-1ubuntu2.10+tuxcare.els2_all.deb
    sha:da4871a1aeb0d63c4dbb9cccde730cad11cc8a39
  • cups-core-drivers_2.2.7-1ubuntu2.10+tuxcare.els2_amd64.deb
    sha:cf2af5ff0a703f6d9c0e30a70fe5f40864eb07bc
  • cups-daemon_2.2.7-1ubuntu2.10+tuxcare.els2_amd64.deb
    sha:97f8b2b7b59b55766180a6a4dde335eb3bcaaa72
  • cups-ipp-utils_2.2.7-1ubuntu2.10+tuxcare.els2_amd64.deb
    sha:58fd71b68a1a89d74fb26fd914efedc160d0a7d2
  • cups-ppdc_2.2.7-1ubuntu2.10+tuxcare.els2_amd64.deb
    sha:4d7c5d6772b040783815363fb9823753c35f6630
  • cups-server-common_2.2.7-1ubuntu2.10+tuxcare.els2_all.deb
    sha:307d47bb2930c7b17e7e9008fa4923c99808491c
  • libcups2_2.2.7-1ubuntu2.10+tuxcare.els2_amd64.deb
    sha:5a6b6cfeb7f4454b48b6fff79dc2296674e1522d
  • libcups2-dev_2.2.7-1ubuntu2.10+tuxcare.els2_amd64.deb
    sha:8cfd8e8bf25b1cd792b3a5bab1cf87c40e27c458
  • libcupscgi1_2.2.7-1ubuntu2.10+tuxcare.els2_amd64.deb
    sha:001480ce86e96777e992acef6265890fb3021855
  • libcupsimage2_2.2.7-1ubuntu2.10+tuxcare.els2_amd64.deb
    sha:5df2f4c855e24bbcf9f9a5fc9941f7ba9b16f256
  • libcupsimage2-dev_2.2.7-1ubuntu2.10+tuxcare.els2_amd64.deb
    sha:27b75c0fd0cb12bf3b68ebc95a7985e7b30c73f0
  • libcupsmime1_2.2.7-1ubuntu2.10+tuxcare.els2_amd64.deb
    sha:4bf3a4b52622985f0974b97ef67efaa1680c5b34
  • libcupsppdc1_2.2.7-1ubuntu2.10+tuxcare.els2_amd64.deb
    sha:6513c79e68c00ad548d9f8f8f84ea0f1fcc5ae55
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.