From a19a390f6538d9df8f125d7498a2e5df57612387 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?J=C3=B6rg=20Frings-F=C3=BCrst?= Date: Sat, 5 Dec 2015 14:58:37 +0100 Subject: CVE-2015-8327; rename patches --- ...ck_tick_as_an_illegal_shell_escape_character.patch | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 debian/patches/0115-r7406_also_consider_the_back_tick_as_an_illegal_shell_escape_character.patch (limited to 'debian/patches/0115-r7406_also_consider_the_back_tick_as_an_illegal_shell_escape_character.patch') diff --git a/debian/patches/0115-r7406_also_consider_the_back_tick_as_an_illegal_shell_escape_character.patch b/debian/patches/0115-r7406_also_consider_the_back_tick_as_an_illegal_shell_escape_character.patch new file mode 100644 index 0000000..8e5e404 --- /dev/null +++ b/debian/patches/0115-r7406_also_consider_the_back_tick_as_an_illegal_shell_escape_character.patch @@ -0,0 +1,19 @@ +Description: foomatic-rip: SECURITY FIX: Also consider the back tick ('`') as + an illegal shell escape character. Thanks to Michal Kowalczyk from the Google + Security Team for the hint. +Author: Till Kamppeter +Bug-CVE: CVE-2015-8327 +Origin: upstream +Last-Update: 2015-11-26 + +--- a/util.c ++++ b/util.c +@@ -31,7 +31,7 @@ + #include + + +-const char* shellescapes = "|<>&!$\'\"#*?()[]{}"; ++const char* shellescapes = "|<>&!$\'\"`#*?()[]{}"; + + const char * temp_dir() + { -- cgit v1.2.3