]> code.ossystems Code Review - openembedded-core.git/commitdiff
foomatic-filters: Security fixes CVE-2015-8327
authorArmin Kuster <akuster@mvista.com>
Mon, 1 Feb 2016 17:46:10 +0000 (09:46 -0800)
committerJoshua Lock <joshua.g.lock@intel.com>
Mon, 29 Feb 2016 15:05:16 +0000 (15:05 +0000)
CVE-2015-8327 cups-filters: foomatic-rip did not consider the back tick as an illegal shell escape character

this time with the recipe changes.

(From OE-Core master rev: 62d6876033476592a8ca35f4e563c996120a687b)

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Joshua Lock <joshua.g.lock@intel.com>
meta/recipes-extended/foomatic/foomatic-filters-4.0.17/CVE-2015-8327.patch [new file with mode: 0644]
meta/recipes-extended/foomatic/foomatic-filters_4.0.17.bb

diff --git a/meta/recipes-extended/foomatic/foomatic-filters-4.0.17/CVE-2015-8327.patch b/meta/recipes-extended/foomatic/foomatic-filters-4.0.17/CVE-2015-8327.patch
new file mode 100644 (file)
index 0000000..aaedc88
--- /dev/null
@@ -0,0 +1,23 @@
+Upstream-Status: Backport
+
+
+http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406
+
+Hand applied change to util.c. Fix was for cups-filters but also applied to foomatic-filters.
+
+CVE: CVE-2015-8327
+Signed-off-by: Armin Kuster <akuster@mvista.com>
+
+Index: util.c
+===================================================================
+--- a/util.c
++++ b/util.c
+@@ -31,7 +31,7 @@
+ #include <assert.h>
+-const char* shellescapes = "|;<>&!$\'\"#*?()[]{}";
++const char* shellescapes = "|;<>&!$\'\"`#*?()[]{}";
+ const char * temp_dir()
+ {
index 7d0d717abb764f73c11286b7025c86d5c7a0f7f0..58ef1f5b0d0715315b5a66f6324f3581e120e83d 100644 (file)
@@ -18,6 +18,7 @@ LIC_FILES_CHKSUM = "file://${WORKDIR}/foomatic-filters-${PV}/COPYING;md5=393a5ca
 SRC_URI = "http://www.openprinting.org/download/foomatic/foomatic-filters-${PV}.tar.gz"
 
 SRC_URI += "file://CVE-2015-8560.patch \
+            file://CVE-2015-8327.patch \
            "
 
 SRC_URI[md5sum] = "b05f5dcbfe359f198eef3df5b283d896"