]> code.ossystems Code Review - openembedded-core.git/commit
libxml2: fix CVE-2014-0191
authorMaxin B. John <maxin.john@enea.com>
Wed, 7 May 2014 12:24:15 +0000 (14:24 +0200)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Thu, 29 May 2014 12:42:07 +0000 (13:42 +0100)
commit51f674ab1f7dac049060c58f89e84c5d1275a87b
treea2dc1a1d04bff62dd280c9b53f554ca7edfa63c3
parentf1f97c61281158432a98279a2f7b4931173f406e
libxml2: fix CVE-2014-0191

It was discovered that libxml2, a library providing support to read,
modify and write XML files, incorrectly performs entity substituton in
the doctype prolog, even if the application using libxml2 disabled any
entity substitution. A remote attacker could provide a
specially-crafted XML file that, when processed, would lead to the
exhaustion of CPU and memory resources or file descriptors.

Reference: https://access.redhat.com/security/cve/CVE-2014-0191

(From OE-Core rev: 674bd59d5e357a4aba18c472ac21712a660a84af)

Signed-off-by: Maxin B. John <maxin.john@enea.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-core/libxml/libxml2.inc
meta/recipes-core/libxml/libxml2/libxml2-CVE-2014-0191-fix.patch [new file with mode: 0644]