summaryrefslogtreecommitdiffstats
path: root/meta-oe/recipes-support/libtinyxml
diff options
context:
space:
mode:
Diffstat (limited to 'meta-oe/recipes-support/libtinyxml')
-rw-r--r--meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2021-42260.patch27
-rw-r--r--meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2023-34194.patch31
-rw-r--r--meta-oe/recipes-support/libtinyxml/libtinyxml_2.6.2.bb9
3 files changed, 64 insertions, 3 deletions
diff --git a/meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2021-42260.patch b/meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2021-42260.patch
new file mode 100644
index 0000000000..8fc623744c
--- /dev/null
+++ b/meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2021-42260.patch
@@ -0,0 +1,27 @@
1Description: In stamp always advance the pointer if *p= 0xef
2 .
3 The current implementation only advanced if 0xef is followed
4 by two non-zero bytes. In case of malformed input (0xef should be
5 the start byte of a three byte character) this leads to an infinite
6 loop. (CVE-2021-42260)
7Origin: https://sourceforge.net/p/tinyxml/git/merge-requests/1/
8
9CVE: CVE-2021-42260
10Upstream-Status: Inactive-Upstream [lastrelease: 2011]
11Signed-off-by: Peter Marko <peter.marko@siemens.com>
12
13--- a/tinyxmlparser.cpp
14+++ b/tinyxmlparser.cpp
15@@ -274,6 +274,12 @@ void TiXmlParsingData::Stamp( const char* now, TiXmlEncoding encoding )
16 else
17 { p +=3; ++col; } // A normal character.
18 }
19+ else
20+ {
21+ // TIXML_UTF_LEAD_0 (239) is the start character of a 3 byte sequence, so
22+ // there is something wrong here. Just advance the pointer to evade infinite loops
23+ ++p;
24+ }
25 }
26 else
27 {
diff --git a/meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2023-34194.patch b/meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2023-34194.patch
new file mode 100644
index 0000000000..a94806daad
--- /dev/null
+++ b/meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2023-34194.patch
@@ -0,0 +1,31 @@
1From: Guilhem Moulin <guilhem@debian.org>
2Date: Sat, 30 Dec 2023 14:15:54 +0100
3Subject: Avoid reachable assertion via crafted XML document with a '\0'
4 located after whitespace
5
6Bug: https://www.forescout.com/resources/sierra21-vulnerabilities
7Bug-Debian: https://bugs.debian.org/1059315
8Bug-Debian: https://security-tracker.debian.org/tracker/CVE-2023-34194
9
10CVE: CVE-2023-34194
11Upstream-Status: Inactive-Upstream [lastrelease: 2011]
12Signed-off-by: Peter Marko <peter.marko@siemens.com>
13---
14 tinyxmlparser.cpp | 4 ++++
15 1 file changed, 4 insertions(+)
16
17diff --git a/tinyxmlparser.cpp b/tinyxmlparser.cpp
18index 8aa0dfa..1601962 100644
19--- a/tinyxmlparser.cpp
20+++ b/tinyxmlparser.cpp
21@@ -1606,6 +1606,10 @@ const char* TiXmlDeclaration::Parse( const char* p, TiXmlParsingData* data, TiXm
22 }
23
24 p = SkipWhiteSpace( p, _encoding );
25+ if ( !p || !*p )
26+ {
27+ break;
28+ }
29 if ( StringEqual( p, "version", true, _encoding ) )
30 {
31 TiXmlAttribute attrib;
diff --git a/meta-oe/recipes-support/libtinyxml/libtinyxml_2.6.2.bb b/meta-oe/recipes-support/libtinyxml/libtinyxml_2.6.2.bb
index 6fbdd071e8..b91a455aff 100644
--- a/meta-oe/recipes-support/libtinyxml/libtinyxml_2.6.2.bb
+++ b/meta-oe/recipes-support/libtinyxml/libtinyxml_2.6.2.bb
@@ -5,15 +5,18 @@ HOMEPAGE = "http://www.sourceforge.net/projects/tinyxml"
5LICENSE = "Zlib" 5LICENSE = "Zlib"
6LIC_FILES_CHKSUM = "file://readme.txt;md5=f8f366f3370dda889f60faa7db162cf4" 6LIC_FILES_CHKSUM = "file://readme.txt;md5=f8f366f3370dda889f60faa7db162cf4"
7SECTION = "libs" 7SECTION = "libs"
8CVE_PRODUCT = "tinyxml"
8 9
9 10
10SRC_URI = "${SOURCEFORGE_MIRROR}/tinyxml/tinyxml_${@'${PV}'.replace('.', '_')}.tar.gz \ 11SRC_URI = "${SOURCEFORGE_MIRROR}/tinyxml/tinyxml_${@'${PV}'.replace('.', '_')}.tar.gz \
11 file://enforce-use-stl.patch \ 12 file://enforce-use-stl.patch \
12 file://entity-encoding.patch" 13 file://entity-encoding.patch \
13SRC_URI[md5sum] = "c1b864c96804a10526540c664ade67f0" 14 file://CVE-2021-42260.patch \
15 file://CVE-2023-34194.patch \
16"
14SRC_URI[sha256sum] = "15bdfdcec58a7da30adc87ac2b078e4417dbe5392f3afb719f9ba6d062645593" 17SRC_URI[sha256sum] = "15bdfdcec58a7da30adc87ac2b078e4417dbe5392f3afb719f9ba6d062645593"
15 18
16S = "${WORKDIR}/tinyxml" 19S = "${UNPACKDIR}/tinyxml"
17 20
18EXTRA_CXXFLAGS = "-I. -fPIC" 21EXTRA_CXXFLAGS = "-I. -fPIC"
19 22