summaryrefslogtreecommitdiff
path: root/debian/patches/0051-CVE-2019-8842-The-ippReadIO-function-may-under-read-.patch
diff options
context:
space:
mode:
Diffstat (limited to 'debian/patches/0051-CVE-2019-8842-The-ippReadIO-function-may-under-read-.patch')
-rw-r--r--debian/patches/0051-CVE-2019-8842-The-ippReadIO-function-may-under-read-.patch23
1 files changed, 23 insertions, 0 deletions
diff --git a/debian/patches/0051-CVE-2019-8842-The-ippReadIO-function-may-under-read-.patch b/debian/patches/0051-CVE-2019-8842-The-ippReadIO-function-may-under-read-.patch
new file mode 100644
index 000000000..b46bd1b92
--- /dev/null
+++ b/debian/patches/0051-CVE-2019-8842-The-ippReadIO-function-may-under-read-.patch
@@ -0,0 +1,23 @@
+From f1b7b7e074291c85366a60f7a197dea19e62c9cf Mon Sep 17 00:00:00 2001
+From: Didier Raboud <odyx@debian.org>
+Date: Sat, 25 Apr 2020 16:02:12 +0200
+Subject: CVE-2019-8842: The `ippReadIO` function may under-read an extension
+ field
+
+---
+ cups/ipp.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/cups/ipp.c b/cups/ipp.c
+index 98b499716..4ebb1da9c 100644
+--- a/cups/ipp.c
++++ b/cups/ipp.c
+@@ -2960,7 +2960,7 @@ ippReadIO(void *src, /* I - Data source */
+ * Read 32-bit "extension" tag...
+ */
+
+- if ((*cb)(src, buffer, 4) < 1)
++ if ((*cb)(src, buffer, 4) < 4)
+ {
+ DEBUG_puts("1ippReadIO: Callback returned EOF/error");
+ _cupsBufferRelease((char *)buffer);