aboutsummaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/libxml/libxml2.inc
diff options
context:
space:
mode:
authorMaxin B. John <maxin.john@enea.com>2014-05-07 14:24:15 +0200
committerRichard Purdie <richard.purdie@linuxfoundation.org>2014-05-08 13:00:23 +0100
commit674bd59d5e357a4aba18c472ac21712a660a84af (patch)
tree7ce74ef39d460f5ede9dac92250359d1ebd8bf00 /meta/recipes-core/libxml/libxml2.inc
parentfe19e4d13a645efccd778cfd3a7b55fe74498d60 (diff)
downloadopenembedded-core-contrib-674bd59d5e357a4aba18c472ac21712a660a84af.tar.gz
libxml2: fix CVE-2014-0191
It was discovered that libxml2, a library providing support to read, modify and write XML files, incorrectly performs entity substituton in the doctype prolog, even if the application using libxml2 disabled any entity substitution. A remote attacker could provide a specially-crafted XML file that, when processed, would lead to the exhaustion of CPU and memory resources or file descriptors. Reference: https://access.redhat.com/security/cve/CVE-2014-0191 Signed-off-by: Maxin B. John <maxin.john@enea.com> Signed-off-by: Saul Wold <sgw@linux.intel.com>
Diffstat (limited to 'meta/recipes-core/libxml/libxml2.inc')
-rw-r--r--meta/recipes-core/libxml/libxml2.inc1
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-core/libxml/libxml2.inc b/meta/recipes-core/libxml/libxml2.inc
index 7fb2644416..60bb6b8539 100644
--- a/meta/recipes-core/libxml/libxml2.inc
+++ b/meta/recipes-core/libxml/libxml2.inc
@@ -18,6 +18,7 @@ SRC_URI = "ftp://xmlsoft.org/libxml2/libxml2-${PV}.tar.gz;name=libtar \
file://ansidecl.patch \
file://runtest.patch \
file://run-ptest \
+ file://libxml2-CVE-2014-0191-fix.patch \
"
inherit autotools pkgconfig binconfig pythonnative ptest