diff options
Diffstat (limited to 'meta-oe/recipes-support/libtinyxml')
3 files changed, 64 insertions, 3 deletions
diff --git a/meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2021-42260.patch b/meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2021-42260.patch new file mode 100644 index 0000000000..8fc623744c --- /dev/null +++ b/meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2021-42260.patch | |||
@@ -0,0 +1,27 @@ | |||
1 | Description: In stamp always advance the pointer if *p= 0xef | ||
2 | . | ||
3 | The current implementation only advanced if 0xef is followed | ||
4 | by two non-zero bytes. In case of malformed input (0xef should be | ||
5 | the start byte of a three byte character) this leads to an infinite | ||
6 | loop. (CVE-2021-42260) | ||
7 | Origin: https://sourceforge.net/p/tinyxml/git/merge-requests/1/ | ||
8 | |||
9 | CVE: CVE-2021-42260 | ||
10 | Upstream-Status: Inactive-Upstream [lastrelease: 2011] | ||
11 | Signed-off-by: Peter Marko <peter.marko@siemens.com> | ||
12 | |||
13 | --- a/tinyxmlparser.cpp | ||
14 | +++ b/tinyxmlparser.cpp | ||
15 | @@ -274,6 +274,12 @@ void TiXmlParsingData::Stamp( const char* now, TiXmlEncoding encoding ) | ||
16 | else | ||
17 | { p +=3; ++col; } // A normal character. | ||
18 | } | ||
19 | + else | ||
20 | + { | ||
21 | + // TIXML_UTF_LEAD_0 (239) is the start character of a 3 byte sequence, so | ||
22 | + // there is something wrong here. Just advance the pointer to evade infinite loops | ||
23 | + ++p; | ||
24 | + } | ||
25 | } | ||
26 | else | ||
27 | { | ||
diff --git a/meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2023-34194.patch b/meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2023-34194.patch new file mode 100644 index 0000000000..a94806daad --- /dev/null +++ b/meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2023-34194.patch | |||
@@ -0,0 +1,31 @@ | |||
1 | From: Guilhem Moulin <guilhem@debian.org> | ||
2 | Date: Sat, 30 Dec 2023 14:15:54 +0100 | ||
3 | Subject: Avoid reachable assertion via crafted XML document with a '\0' | ||
4 | located after whitespace | ||
5 | |||
6 | Bug: https://www.forescout.com/resources/sierra21-vulnerabilities | ||
7 | Bug-Debian: https://bugs.debian.org/1059315 | ||
8 | Bug-Debian: https://security-tracker.debian.org/tracker/CVE-2023-34194 | ||
9 | |||
10 | CVE: CVE-2023-34194 | ||
11 | Upstream-Status: Inactive-Upstream [lastrelease: 2011] | ||
12 | Signed-off-by: Peter Marko <peter.marko@siemens.com> | ||
13 | --- | ||
14 | tinyxmlparser.cpp | 4 ++++ | ||
15 | 1 file changed, 4 insertions(+) | ||
16 | |||
17 | diff --git a/tinyxmlparser.cpp b/tinyxmlparser.cpp | ||
18 | index 8aa0dfa..1601962 100644 | ||
19 | --- a/tinyxmlparser.cpp | ||
20 | +++ b/tinyxmlparser.cpp | ||
21 | @@ -1606,6 +1606,10 @@ const char* TiXmlDeclaration::Parse( const char* p, TiXmlParsingData* data, TiXm | ||
22 | } | ||
23 | |||
24 | p = SkipWhiteSpace( p, _encoding ); | ||
25 | + if ( !p || !*p ) | ||
26 | + { | ||
27 | + break; | ||
28 | + } | ||
29 | if ( StringEqual( p, "version", true, _encoding ) ) | ||
30 | { | ||
31 | TiXmlAttribute attrib; | ||
diff --git a/meta-oe/recipes-support/libtinyxml/libtinyxml_2.6.2.bb b/meta-oe/recipes-support/libtinyxml/libtinyxml_2.6.2.bb index 6fbdd071e8..b91a455aff 100644 --- a/meta-oe/recipes-support/libtinyxml/libtinyxml_2.6.2.bb +++ b/meta-oe/recipes-support/libtinyxml/libtinyxml_2.6.2.bb | |||
@@ -5,15 +5,18 @@ HOMEPAGE = "http://www.sourceforge.net/projects/tinyxml" | |||
5 | LICENSE = "Zlib" | 5 | LICENSE = "Zlib" |
6 | LIC_FILES_CHKSUM = "file://readme.txt;md5=f8f366f3370dda889f60faa7db162cf4" | 6 | LIC_FILES_CHKSUM = "file://readme.txt;md5=f8f366f3370dda889f60faa7db162cf4" |
7 | SECTION = "libs" | 7 | SECTION = "libs" |
8 | CVE_PRODUCT = "tinyxml" | ||
8 | 9 | ||
9 | 10 | ||
10 | SRC_URI = "${SOURCEFORGE_MIRROR}/tinyxml/tinyxml_${@'${PV}'.replace('.', '_')}.tar.gz \ | 11 | SRC_URI = "${SOURCEFORGE_MIRROR}/tinyxml/tinyxml_${@'${PV}'.replace('.', '_')}.tar.gz \ |
11 | file://enforce-use-stl.patch \ | 12 | file://enforce-use-stl.patch \ |
12 | file://entity-encoding.patch" | 13 | file://entity-encoding.patch \ |
13 | SRC_URI[md5sum] = "c1b864c96804a10526540c664ade67f0" | 14 | file://CVE-2021-42260.patch \ |
15 | file://CVE-2023-34194.patch \ | ||
16 | " | ||
14 | SRC_URI[sha256sum] = "15bdfdcec58a7da30adc87ac2b078e4417dbe5392f3afb719f9ba6d062645593" | 17 | SRC_URI[sha256sum] = "15bdfdcec58a7da30adc87ac2b078e4417dbe5392f3afb719f9ba6d062645593" |
15 | 18 | ||
16 | S = "${WORKDIR}/tinyxml" | 19 | S = "${UNPACKDIR}/tinyxml" |
17 | 20 | ||
18 | EXTRA_CXXFLAGS = "-I. -fPIC" | 21 | EXTRA_CXXFLAGS = "-I. -fPIC" |
19 | 22 | ||