aboutsummaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/cups/cups_1.4.6.bb
AgeCommit message (Collapse)Author
2012-12-19cups: Update to 1.6.1Saul Wold
License change was due to update of Date. Remove CVE patches as they where backports from this release Signed-off-by: Saul Wold <sgw@linux.intel.com>
2012-12-14cups CVE-2011-3170Li Wang
the patch come from: http://cups.org/strfiles/3914/str3914.patch The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3170 [YOCTO #3583] [ CQID: WIND00299594 ] Upstream-Status: Backport Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com>
2012-12-14cups - CVE-2011-2896Li Wang
the patch come from: http://cups.org/strfiles/3867/str3867.patch The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2896 [YOCTO #3582] [ CQID: WIND00299595 ] Upstream-Status: Backport Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com>
2012-12-14cups: CVE-2012-5519Li Wang
lpadmin to (limited) root privilege escalation http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5519 http://www.cups.org/strfiles/4223/str4223v2-1.4.4-debian.patch [YOCTO #3579] [ CQID: WIND00392016 ] Upstream-Status: Backport Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com>
2012-08-23cups: disable pdftopsSaul Wold
This ensure a reliable built without host contamination, this will also disable the usage of ghostscript. [YOCTO #2966] Signed-off-by: Saul Wold <sgw@linux.intel.com>
2012-07-26cups_1.4.6.bb: Fix build on ppc64Khem Raj
ppc64 uses lib64 and usr/lib64 for library paths so we need to train cups build system Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Saul Wold <sgw@linux.intel.com>
2012-06-19cups: clean up FILE after PACKAGE reorderSaul Wold
Signed-off-by: Saul Wold <sgw@linux.intel.com>
2012-03-16cups: Ensure cups-config has correct target paths, not sysroot ones for ↵Richard Purdie
cups_serverbin and cups_datadir variables These are used by dependent packages to know where to install cups related pieces into therefore we need to remove the sysroot prefix from these. Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2011-09-22cups: Fix recipe to use the correct cups directoriesMark Hatle
${libdir} is not used, instead they use a common ${exec_prefix}/lib directory structure for helpers, filters, renderers, etc. Signed-off-by: Mark Hatle <mark.hatle@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2011-07-27cups: add pam supportKang Kai
According to distro_feature then add pam support for cups or not. Signed-off-by: Kang Kai <kai.kang@windriver.com>
2011-02-01cups: add cups 1.4.6Jingdong Lu
This package has been added from meta-openembedded committed by Koen Kooi. Changes from the meta-openembedded version: * Add SUMMARY * Change dependence name: libusb * Add PR Signed-off-by: Jingdong Lu <jingdong.lu@windriver.com>