]> code.ossystems Code Review - openembedded-core.git/commit
dpkg: Security Advisory - CVE-2014-0471
authorGuillem Jover <guillem@debian.org>
Tue, 17 Jun 2014 08:25:51 +0000 (04:25 -0400)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Fri, 10 Oct 2014 14:05:51 +0000 (15:05 +0100)
commitc75316fc256d229cfad45cd57328920993d93d8d
tree9b37211442b68552c102947107b0575655466adb
parent9b3a2d0716540dae72376a8c2e418b244a85c0cb
dpkg: Security Advisory - CVE-2014-0471

v2 changes:
* update format for commit log
* add Upstream-Status for patch

commit a82651188476841d190c58693f95827d61959b51 upstream

Dkpkg::Source::Patch: Correctly parse C-style diff filenames

We need to strip the surrounding quotes, and unescape any escape
sequence, so that we check the same files that the patch program will
be using, otherwise a malicious package could overpass those checks,
and perform directory traversal attacks on source package unpacking.

Fixes: CVE-2014-0471
Reported-by: Jakub Wilk <jwilk@debian.org>
[drop the text for debian/changelog,because it's not suitable
 for the veriosn]

(From OE-Core rev: 81880b34a8261e824c5acafaa4cb321908e554a0)

Signed-off-by: Wenlin Kang <wenlin.kang@windriver.com>
Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-devtools/dpkg/dpkg/dpkg-1.17.4-CVE-2014-0471.patch [new file with mode: 0644]
meta/recipes-devtools/dpkg/dpkg_1.17.4.bb