]> code.ossystems Code Review - openembedded-core.git/commit
libxml2: fix CVE-2014-3660
authorJoe MacDonald <joe_macdonald@mentor.com>
Mon, 20 Oct 2014 17:51:21 +0000 (13:51 -0400)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Fri, 24 Oct 2014 16:31:58 +0000 (17:31 +0100)
commit643597a5c432b2e02033d0cefa3ba4da980d078f
treec8ff763754e6603c81eaee4db9d933980a8484f3
parent048130996300e1762bc6d714ba09aac5a326843d
libxml2: fix CVE-2014-3660

It was discovered that the patch for CVE-2014-0191 for libxml2 is
incomplete.  It is still possible to have libxml2 incorrectly perform
entity substituton even when the application using libxml2 explicitly
disables the feature.  This can allow a remote denial-of-service attack on
systems with libxml2 prior to 2.9.2.

References:
    http://www.openwall.com/lists/oss-security/2014/10/17/7
    https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html

Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
meta/recipes-core/libxml/libxml2.inc
meta/recipes-core/libxml/libxml2/libxml2-CVE-2014-3660.patch [new file with mode: 0644]