]> code.ossystems Code Review - openembedded-core.git/commit
libxml2: fix CVE-2014-0191
authorMaxin B. John <maxin.john@enea.com>
Wed, 7 May 2014 12:24:15 +0000 (14:24 +0200)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Thu, 8 May 2014 12:00:23 +0000 (13:00 +0100)
commit674bd59d5e357a4aba18c472ac21712a660a84af
tree7ce74ef39d460f5ede9dac92250359d1ebd8bf00
parentfe19e4d13a645efccd778cfd3a7b55fe74498d60
libxml2: fix CVE-2014-0191

It was discovered that libxml2, a library providing support to read,
modify and write XML files, incorrectly performs entity substituton in
the doctype prolog, even if the application using libxml2 disabled any
entity substitution. A remote attacker could provide a
specially-crafted XML file that, when processed, would lead to the
exhaustion of CPU and memory resources or file descriptors.

Reference: https://access.redhat.com/security/cve/CVE-2014-0191

Signed-off-by: Maxin B. John <maxin.john@enea.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
meta/recipes-core/libxml/libxml2.inc
meta/recipes-core/libxml/libxml2/libxml2-CVE-2014-0191-fix.patch [new file with mode: 0644]