]> code.ossystems Code Review - openembedded-core.git/commit
libxml2: CVE-2016-9318
authorCatalin Enache <catalin.enache@windriver.com>
Fri, 14 Apr 2017 08:43:32 +0000 (11:43 +0300)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Fri, 28 Apr 2017 10:26:07 +0000 (11:26 +0100)
commit0dd44c00e3b2fbc3befc3f361624a3a60161d979
tree9c8fefa05ba36bd4cbf56e42433d8329ec660e16
parent6679a4d4379f6f18554ed0042546cce94d5d0b19
libxml2: CVE-2016-9318

libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier
and other products, does not offer a flag directly indicating that
the current document may be read but other files may not be opened,
which makes it easier for remote attackers to conduct XML External
Entity (XXE) attacks via a crafted document.

Reference:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9318

Upstream patch:
https://git.gnome.org/browse/libxml2/commit/?id=2304078555896cf1638c628f50326aeef6f0e0d0

Signed-off-by: Catalin Enache <catalin.enache@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
meta/recipes-core/libxml/libxml2/CVE-2016-9318.patch [new file with mode: 0644]
meta/recipes-core/libxml/libxml2_2.9.4.bb