Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package cups for openSUSE:Factory checked in 
at 2021-02-07 15:14:14
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/cups (Old)
 and      /work/SRC/openSUSE:Factory/.cups.new.28504 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "cups"

Sun Feb  7 15:14:14 2021 rev:152 rq:868667 version:2.3.3

Changes:
--------
--- /work/SRC/openSUSE:Factory/cups/cups.changes        2020-10-26 
16:12:24.222721224 +0100
+++ /work/SRC/openSUSE:Factory/.cups.new.28504/cups.changes     2021-02-07 
15:14:23.821410694 +0100
@@ -1,0 +2,6 @@
+Tue Feb  2 14:22:38 CET 2021 - jsm...@suse.de
+
+- CVE-2020-10001.patch fixes CVE-2020-10001 (bsc#1180520)
+  access to uninitialized buffer in ipp.c
+
+-------------------------------------------------------------------

New:
----
  CVE-2020-10001.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ cups.spec ++++++
--- /var/tmp/diff_new_pack.JaWln0/_old  2021-02-07 15:14:25.065412024 +0100
+++ /var/tmp/diff_new_pack.JaWln0/_new  2021-02-07 15:14:25.097412058 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package cups
 #
-# Copyright (c) 2020 SUSE LLC
+# Copyright (c) 2021 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -75,6 +75,9 @@
 Patch103:       cups-1.4-do_not_strip_recommended_from_PPDs.patch
 # Patch104 cups-config-libs.patch fixes option --libs in cups-config script:
 Patch104:       cups-config-libs.patch
+# Patch105 CVE-2020-10001.patch fixes CVE-2020-10001 (bsc#1180520)
+# access to uninitialized buffer in ipp.c
+Patch105:       CVE-2020-10001.patch
 # Build Requirements:
 BuildRequires:  dbus-1-devel
 BuildRequires:  fdupes
@@ -296,6 +299,9 @@
 %patch103 -b do_not_strip_recommended_from_PPDs.orig
 # Patch104 cups-config-libs.patch fixes option --libs in cups-config script:
 %patch104 -b cups-config-libs.orig
+# Patch105 CVE-2020-10001.patch fixes CVE-2020-10001 (bsc#1180520)
+# access to uninitialized buffer in ipp.c
+%patch105 -b CVE-2020-10001.orig
 
 %build
 # Remove ".SILENT" rule for verbose build output

++++++ CVE-2020-10001.patch ++++++
--- cups/ipp.c.orig     2021-01-11 10:53:43.080847679 +0100
+++ cups/ipp.c  2021-01-11 12:03:56.010423238 +0100
@@ -2965,7 +2965,8 @@ ippReadIO(void       *src,                /* I - Data
   unsigned char                *buffer,        /* Data buffer */
                        string[IPP_MAX_TEXT],
                                        /* Small string buffer */
-                       *bufptr;        /* Pointer into buffer */
+                       *bufptr,        /* Pointer into buffer */
+                       *bufend;        /* End of buffer */
   ipp_attribute_t      *attr;          /* Current attribute */
   ipp_tag_t            tag;            /* Current tag */
   ipp_tag_t            value_tag;      /* Current value tag */
@@ -3524,6 +3525,7 @@ ippReadIO(void       *src,                /* I - Data
                }
 
                 bufptr = buffer;
+                bufend = buffer + n;
 
               /*
                * text-with-language and name-with-language are composite
@@ -3537,7 +3539,7 @@ ippReadIO(void       *src,                /* I - Data
 
                n = (bufptr[0] << 8) | bufptr[1];
 
-               if ((bufptr + 2 + n) >= (buffer + IPP_BUF_SIZE) || n >= 
(int)sizeof(string))
+               if ((bufptr + 2 + n + 2) > bufend || n >= (int)sizeof(string))
                {
                  _cupsSetError(IPP_STATUS_ERROR_INTERNAL,
                                _("IPP language length overflows value."), 1);
@@ -3564,7 +3566,7 @@ ippReadIO(void       *src,                /* I - Data
                 bufptr += 2 + n;
                n = (bufptr[0] << 8) | bufptr[1];
 
-               if ((bufptr + 2 + n) >= (buffer + IPP_BUF_SIZE))
+               if ((bufptr + 2 + n) > bufend)
                {
                  _cupsSetError(IPP_STATUS_ERROR_INTERNAL,
                                _("IPP string length overflows value."), 1);

Reply via email to