diff options
author | Scott Garman <scott.a.garman@intel.com> | 2012-12-27 16:28:51 -0800 |
---|---|---|
committer | Scott Garman <scott.a.garman@intel.com> | 2012-12-27 16:28:51 -0800 |
commit | f4aca76c7933abf2771999c309d49ab91a3d9480 (patch) | |
tree | 93027694a2d4efe4f1ddd224e938776e2b441445 /meta/recipes-extended/cups/cups_1.4.6.bb | |
parent | 6d030fcb69221da073ce413049deb8447934bed5 (diff) | |
download | openembedded-core-f4aca76c7933abf2771999c309d49ab91a3d9480.tar.gz openembedded-core-f4aca76c7933abf2771999c309d49ab91a3d9480.tar.bz2 openembedded-core-f4aca76c7933abf2771999c309d49ab91a3d9480.zip |
cups: patch for CVE-2011-2896
Patch from: http://cups.org/strfiles/3867/str3867.patch
The LZW decompressor in the LWZReadByte function in giftoppm.c in the
David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw
function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte
function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier,
the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4
and earlier, and other products, does not properly handle code words
that are absent from the decompression table when encountered, which
allows remote attackers to trigger an infinite loop or a heap-based
buffer overflow, and possibly execute arbitrary code, via a crafted
compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2896
[YOCTO #3582]
[ CQID: WIND00299595 ]
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Merged with denzil branch, partial fix for denzil bug [YOCTO #3652]
Signed-off-by: Scott Garman <scott.a.garman@intel.com>
Diffstat (limited to 'meta/recipes-extended/cups/cups_1.4.6.bb')
-rw-r--r-- | meta/recipes-extended/cups/cups_1.4.6.bb | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/meta/recipes-extended/cups/cups_1.4.6.bb b/meta/recipes-extended/cups/cups_1.4.6.bb index ec555d791d..3e31c0881c 100644 --- a/meta/recipes-extended/cups/cups_1.4.6.bb +++ b/meta/recipes-extended/cups/cups_1.4.6.bb @@ -1,6 +1,6 @@ require cups14.inc -PR = "r3" +PR = "r4" DEPENDS += "libusb \ ${@base_contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" @@ -8,6 +8,7 @@ LIC_FILES_CHKSUM = "file://LICENSE.txt;md5=956e7600195e6139f12de8c2a5bbefa9" SRC_URI += " \ file://use_echo_only_in_init.patch \ file://0001-don-t-try-to-run-generated-binaries.patch \ + file://cups-CVE-2011-2896.patch \ " SRC_URI[md5sum] = "de8fb5a29c36554925c0c6a6e2c0dae1" |