slackware-current/patches/source/ntp/rc.ntpd
Patrick J Volkerding 3f544e903a Fri Jun 2 20:56:35 UTC 2023
patches/packages/cups-2.4.3-x86_64-1_slack15.0.txz:  Upgraded.
  Fixed a heap buffer overflow in _cups_strlcpy(), when the configuration file
  cupsd.conf sets the value of loglevel to DEBUG, that could allow a remote
  attacker to launch a denial of service (DoS) attack, or possibly execute
  arbirary code.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-32324
  (* Security fix *)
patches/packages/ntp-4.2.8p16-x86_64-1_slack15.0.txz:  Upgraded.
  This update fixes bugs and security issues.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-26551
    https://www.cve.org/CVERecord?id=CVE-2023-26552
    https://www.cve.org/CVERecord?id=CVE-2023-26553
    https://www.cve.org/CVERecord?id=CVE-2023-26554
    https://www.cve.org/CVERecord?id=CVE-2023-26555
  (* Security fix *)
2023-06-03 13:30:32 +02:00

55 lines
805 B
Bash

#!/bin/sh
# Start/stop/restart ntpd.
# Start ntpd:
ntpd_start() {
echo -n "Starting NTP daemon: /usr/sbin/ntpd -g -u ntp:ntp"
/usr/sbin/ntpd -g -u ntp:ntp
echo
}
# Stop ntpd:
ntpd_stop() {
echo -n "Stopping NTP daemon..."
if [ -r /run/ntpd.pid ]; then
kill -HUP $(cat /run/ntpd.pid)
rm -f /run/ntpd.pid
else
killall -HUP -q ntpd
fi
echo
}
# Restart ntpd:
ntpd_restart() {
ntpd_stop
sleep 1
ntpd_start
}
# Check if ntpd is running
ntpd_status() {
if [ -e /run/ntpd.pid ]; then
echo "ntpd is running as pid $(cat /run/ntpd.pid)."
else
echo "ntpd is stopped."
exit 1
fi
}
case "$1" in
'start')
ntpd_start
;;
'stop')
ntpd_stop
;;
'restart')
ntpd_restart
;;
'status')
ntpd_status
;;
*)
echo "usage $0 start|stop|restart|status"
esac