Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Command injection via FoomaticRipCommandLine #599

Open
zdohnal opened this issue Oct 2, 2024 · 0 comments
Open

Command injection via FoomaticRipCommandLine #599

zdohnal opened this issue Oct 2, 2024 · 0 comments

Comments

@zdohnal
Copy link
Member

zdohnal commented Oct 2, 2024

Continuation of GHSA-p9rh-jxmq-gq47 , because the security advisory does not allow adding more comments after it is published.

The current plan:

  • use hashed PPD keyword values to check whether the input is within expectation,
  • provide root-only accessed config file, where user once he authenticates as root can add new hashed inputs, if he thinks the input is safe.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant