X-Original-To: alpine-aports@lists.alpinelinux.org Received: from mail-qk0-f176.google.com (mail-qk0-f176.google.com [209.85.220.176]) by lists.alpinelinux.org (Postfix) with ESMTP id 7B0BA5C4C2D for ; Mon, 7 Aug 2017 15:38:55 +0000 (GMT) Received: by mail-qk0-f176.google.com with SMTP id a77so4763121qkb.0 for ; Mon, 07 Aug 2017 08:38:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id; bh=jtWG2/yPfnbibsj6izVooY6M/FyLpmC8zzFtZw3lquo=; b=ErnOhS49kgyokYXA5VbHMnYHqM6eF56ihbNZAMCe4MHoVXWY3iS3YZusF9cR8F1TpH ejid+KW5znH8DCsPO/M9YzGx+wsBKmxZF8ZqOmU80rewSG59UR06p6ghuKMmAURs4NTz 1pmewJE4KIobctnLIsjPU06r0Q3UiAS5WrfBMZpKgHMFYYPtp74giKfoIuTeC8c4BRl2 sm2kes2Fqo4tYhkqRHepSKfVvD1xlHOT2fcy1eM3CIrgSzaHiy7bihwW24cpgne5BQak lNbXNR9q2yzOrLixTVoz2E4m7zPZVLYkPZmpwApryP3/M/kqOG3AMnjbna3vr9bccXbu 1P3g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id; bh=jtWG2/yPfnbibsj6izVooY6M/FyLpmC8zzFtZw3lquo=; b=OlRPmsUdk1lP8vyzCsRgEctcasosWHzbPdo8G2dfTz31uIr7H5zVoSNnMCHFymdBua rDviEs9xsnPZjRf6Nm4vRyWTGu7i4KhxJPj2Z3OOlBIROctXKscPiSFxunziMMnFTuVs 7oNPnukDg65+qTSbq7IyYg2fGPi6vL7U9gEa1+NDnYsIebtk6tmJjKgzranhXuuEEDYN 5KAuihZnXvwPd42MHBk34oY/sArCd+cegApB1aOonegocP8GyERQFYAkBQ8ER7k+KDaI Sv5s3sukoq7QNK9d7WunX+E8vyaPLGc3jVpDQViKfVxTkLdsd5ceqw2ngoxwUrgVOc/h TXuQ== X-Gm-Message-State: AHYfb5hj1fzqb5Stkx1COlqoIhuVN8Fm03WND4MH+LdeQeEoRLrc47pj 57IqDfp7At0qtNBn X-Received: by 10.55.212.194 with SMTP id s63mr1367750qks.102.1502120334806; Mon, 07 Aug 2017 08:38:54 -0700 (PDT) Received: from localhost.localdomain (c-71-60-35-21.hsd1.pa.comcast.net. [71.60.35.21]) by smtp.googlemail.com with ESMTPSA id c204sm5406261qkb.32.2017.08.07.08.38.52 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 07 Aug 2017 08:38:53 -0700 (PDT) From: Daniel Sabogal To: alpine-aports@lists.alpinelinux.org Subject: [alpine-aports] [PATCH 1/2] main/lxterminal: security fix for CVE-2016-10369 Date: Mon, 7 Aug 2017 11:39:54 -0400 Message-Id: <20170807153956.14312-1-dsabogalcc@gmail.com> X-Mailer: git-send-email 2.13.3 X-Mailinglist: alpine-aports Precedence: list List-Id: Alpine Development List-Unsubscribe: List-Post: List-Help: List-Subscribe: --- main/lxterminal/APKBUILD | 12 +++++++++--- main/lxterminal/CVE-2016-10369.patch | 26 ++++++++++++++++++++++++++ 2 files changed, 35 insertions(+), 3 deletions(-) create mode 100644 main/lxterminal/CVE-2016-10369.patch diff --git a/main/lxterminal/APKBUILD b/main/lxterminal/APKBUILD index 7f227a50ba..534d0bd007 100644 --- a/main/lxterminal/APKBUILD +++ b/main/lxterminal/APKBUILD @@ -2,7 +2,7 @@ # Maintainer: Natanael Copa pkgname=lxterminal pkgver=0.3.0 -pkgrel=0 +pkgrel=1 pkgdesc="Desktop-independent VTE-based terminal emulator" url="http://lxde.org/" arch="all" @@ -11,9 +11,14 @@ depends="" makedepends="vte-dev" install="" subpackages="$pkgname-doc $pkgname-lang" -source="https://downloads.sourceforge.net/lxde/$pkgname-$pkgver.tar.xz" +source="https://downloads.sourceforge.net/lxde/$pkgname-$pkgver.tar.xz + CVE-2016-10369.patch" builddir="$srcdir"/$pkgname-$pkgver +# secfixes: +# 0.3.0-r1: +# - CVE-2016-10369 + build() { cd "$builddir" ./configure \ @@ -33,4 +38,5 @@ package() { make DESTDIR="$pkgdir" install || return 1 } -sha512sums="05eb6ef8904de9e34a4046ded67d3cece5a93a5b19d37d423f3bde67051a2f0a0e3195443669709a8b732d27246852353a2c9ba59026f9d71f8df6bb1152e37f lxterminal-0.3.0.tar.xz" +sha512sums="05eb6ef8904de9e34a4046ded67d3cece5a93a5b19d37d423f3bde67051a2f0a0e3195443669709a8b732d27246852353a2c9ba59026f9d71f8df6bb1152e37f lxterminal-0.3.0.tar.xz +e9fc3d612a8a59e4fb7cd5c339759a7450c8829caa3645e9c859e603a450a173a9215670598d696dc8830de1c78b4a62959bfdb166962cd869ae5a9ec8bab33d CVE-2016-10369.patch" diff --git a/main/lxterminal/CVE-2016-10369.patch b/main/lxterminal/CVE-2016-10369.patch new file mode 100644 index 0000000000..170ad884be --- /dev/null +++ b/main/lxterminal/CVE-2016-10369.patch @@ -0,0 +1,26 @@ +From f99163c6ff8b2f57c5f37b1ce5d62cf7450d4648 Mon Sep 17 00:00:00 2001 +From: Yao Wei +Date: Mon, 8 May 2017 00:47:55 +0800 +Subject: [PATCH] fix: use g_get_user_runtime_dir for socket directory + +This bug is pointed out by stackexchange user that putting socket file in +/tmp is a potential risk. Putting the socket dir in user directory could +mitigate the risk. +--- + src/unixsocket.c | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +diff --git a/src/unixsocket.c b/src/unixsocket.c +index 4c660ac..f88284c 100644 +--- a/src/unixsocket.c ++++ b/src/unixsocket.c +@@ -140,7 +140,8 @@ gboolean lxterminal_socket_initialize(LXTermWindow * lxtermwin, gint argc, gchar + * This function returns TRUE if this process should keep running and FALSE if it should exit. */ + + /* Formulate the path for the Unix domain socket. */ +- gchar * socket_path = g_strdup_printf("/tmp/.lxterminal-socket%s-%s", gdk_display_get_name(gdk_display_get_default()), g_get_user_name()); ++ gchar * socket_path = g_strdup_printf("%s/.lxterminal-socket-%s", g_get_user_runtime_dir(), gdk_display_get_name(gdk_display_get_default())); ++ printf("%s\n", socket_path); + + /* Create socket. */ + int fd = socket(PF_UNIX, SOCK_STREAM, 0); -- 2.13.3 --- Unsubscribe: alpine-aports+unsubscribe@lists.alpinelinux.org Help: alpine-aports+help@lists.alpinelinux.org ---