]> code.ossystems Code Review - openembedded-core.git/commit
libxml2: CVE-2016-9318
authorCatalin Enache <catalin.enache@windriver.com>
Fri, 14 Apr 2017 08:43:32 +0000 (11:43 +0300)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Thu, 18 May 2017 12:04:50 +0000 (13:04 +0100)
commit53c39f29578a4468e7f64a7403e77c28d951de6a
tree91901e5f3fda449e3ead536fcd6c038dd5272b05
parent1d7829ce5e125d9c416ebd66e9363e78f8f5ae1c
libxml2: CVE-2016-9318

libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier
and other products, does not offer a flag directly indicating that
the current document may be read but other files may not be opened,
which makes it easier for remote attackers to conduct XML External
Entity (XXE) attacks via a crafted document.

Reference:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9318

Upstream patch:
https://git.gnome.org/browse/libxml2/commit/?id=2304078555896cf1638c628f50326aeef6f0e0d0

(From OE-Core rev: 0dd44c00e3b2fbc3befc3f361624a3a60161d979)

Signed-off-by: Catalin Enache <catalin.enache@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
meta/recipes-core/libxml/libxml2/CVE-2016-9318.patch [new file with mode: 0644]
meta/recipes-core/libxml/libxml2_2.9.4.bb