summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/cups/cups_1.4.6.bb
diff options
context:
space:
mode:
authorScott Garman <scott.a.garman@intel.com>2012-12-27 16:28:51 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2013-01-03 12:34:26 +0000
commit151d4fbc4e10aea97515757d3f2ff70f86ea9148 (patch)
treedab0776fea94c284c7a26581db51b788322deac2 /meta/recipes-extended/cups/cups_1.4.6.bb
parentcaa1d0308959800ef8d4b730bfbf31fa15593e62 (diff)
downloadpoky-151d4fbc4e10aea97515757d3f2ff70f86ea9148.tar.gz
cups: patch for CVE-2011-2896
Patch from: http://cups.org/strfiles/3867/str3867.patch The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2896 [YOCTO #3582] [ CQID: WIND00299595 ] (From OE-Core rev: f4aca76c7933abf2771999c309d49ab91a3d9480) Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> Merged with denzil branch, partial fix for denzil bug [YOCTO #3652] Signed-off-by: Scott Garman <scott.a.garman@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/cups/cups_1.4.6.bb')
-rw-r--r--meta/recipes-extended/cups/cups_1.4.6.bb3
1 files changed, 2 insertions, 1 deletions
diff --git a/meta/recipes-extended/cups/cups_1.4.6.bb b/meta/recipes-extended/cups/cups_1.4.6.bb
index ec555d791d..3e31c0881c 100644
--- a/meta/recipes-extended/cups/cups_1.4.6.bb
+++ b/meta/recipes-extended/cups/cups_1.4.6.bb
@@ -1,6 +1,6 @@
1require cups14.inc 1require cups14.inc
2 2
3PR = "r3" 3PR = "r4"
4DEPENDS += "libusb \ 4DEPENDS += "libusb \
5 ${@base_contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" 5 ${@base_contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}"
6 6
@@ -8,6 +8,7 @@ LIC_FILES_CHKSUM = "file://LICENSE.txt;md5=956e7600195e6139f12de8c2a5bbefa9"
8SRC_URI += " \ 8SRC_URI += " \
9 file://use_echo_only_in_init.patch \ 9 file://use_echo_only_in_init.patch \
10 file://0001-don-t-try-to-run-generated-binaries.patch \ 10 file://0001-don-t-try-to-run-generated-binaries.patch \
11 file://cups-CVE-2011-2896.patch \
11 " 12 "
12 13
13SRC_URI[md5sum] = "de8fb5a29c36554925c0c6a6e2c0dae1" 14SRC_URI[md5sum] = "de8fb5a29c36554925c0c6a6e2c0dae1"