mirror of
git://slackware.nl/current.git
synced 2025-01-03 23:03:22 +01:00
3f544e903a
patches/packages/cups-2.4.3-x86_64-1_slack15.0.txz: Upgraded. Fixed a heap buffer overflow in _cups_strlcpy(), when the configuration file cupsd.conf sets the value of loglevel to DEBUG, that could allow a remote attacker to launch a denial of service (DoS) attack, or possibly execute arbirary code. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-32324 (* Security fix *) patches/packages/ntp-4.2.8p16-x86_64-1_slack15.0.txz: Upgraded. This update fixes bugs and security issues. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-26551 https://www.cve.org/CVERecord?id=CVE-2023-26552 https://www.cve.org/CVERecord?id=CVE-2023-26553 https://www.cve.org/CVERecord?id=CVE-2023-26554 https://www.cve.org/CVERecord?id=CVE-2023-26555 (* Security fix *)
55 lines
805 B
Bash
55 lines
805 B
Bash
#!/bin/sh
|
|
# Start/stop/restart ntpd.
|
|
|
|
# Start ntpd:
|
|
ntpd_start() {
|
|
echo -n "Starting NTP daemon: /usr/sbin/ntpd -g -u ntp:ntp"
|
|
/usr/sbin/ntpd -g -u ntp:ntp
|
|
echo
|
|
}
|
|
|
|
# Stop ntpd:
|
|
ntpd_stop() {
|
|
echo -n "Stopping NTP daemon..."
|
|
if [ -r /run/ntpd.pid ]; then
|
|
kill -HUP $(cat /run/ntpd.pid)
|
|
rm -f /run/ntpd.pid
|
|
else
|
|
killall -HUP -q ntpd
|
|
fi
|
|
echo
|
|
}
|
|
|
|
# Restart ntpd:
|
|
ntpd_restart() {
|
|
ntpd_stop
|
|
sleep 1
|
|
ntpd_start
|
|
}
|
|
|
|
# Check if ntpd is running
|
|
ntpd_status() {
|
|
if [ -e /run/ntpd.pid ]; then
|
|
echo "ntpd is running as pid $(cat /run/ntpd.pid)."
|
|
else
|
|
echo "ntpd is stopped."
|
|
exit 1
|
|
fi
|
|
}
|
|
|
|
case "$1" in
|
|
'start')
|
|
ntpd_start
|
|
;;
|
|
'stop')
|
|
ntpd_stop
|
|
;;
|
|
'restart')
|
|
ntpd_restart
|
|
;;
|
|
'status')
|
|
ntpd_status
|
|
;;
|
|
*)
|
|
echo "usage $0 start|stop|restart|status"
|
|
esac
|