summaryrefslogtreecommitdiffstats
path: root/meta-oe
diff options
context:
space:
mode:
Diffstat (limited to 'meta-oe')
-rw-r--r--meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2023-34194.patch31
-rw-r--r--meta-oe/recipes-support/libtinyxml/libtinyxml_2.6.2.bb1
2 files changed, 32 insertions, 0 deletions
diff --git a/meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2023-34194.patch b/meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2023-34194.patch
new file mode 100644
index 0000000000..a94806daad
--- /dev/null
+++ b/meta-oe/recipes-support/libtinyxml/libtinyxml/CVE-2023-34194.patch
@@ -0,0 +1,31 @@
1From: Guilhem Moulin <guilhem@debian.org>
2Date: Sat, 30 Dec 2023 14:15:54 +0100
3Subject: Avoid reachable assertion via crafted XML document with a '\0'
4 located after whitespace
5
6Bug: https://www.forescout.com/resources/sierra21-vulnerabilities
7Bug-Debian: https://bugs.debian.org/1059315
8Bug-Debian: https://security-tracker.debian.org/tracker/CVE-2023-34194
9
10CVE: CVE-2023-34194
11Upstream-Status: Inactive-Upstream [lastrelease: 2011]
12Signed-off-by: Peter Marko <peter.marko@siemens.com>
13---
14 tinyxmlparser.cpp | 4 ++++
15 1 file changed, 4 insertions(+)
16
17diff --git a/tinyxmlparser.cpp b/tinyxmlparser.cpp
18index 8aa0dfa..1601962 100644
19--- a/tinyxmlparser.cpp
20+++ b/tinyxmlparser.cpp
21@@ -1606,6 +1606,10 @@ const char* TiXmlDeclaration::Parse( const char* p, TiXmlParsingData* data, TiXm
22 }
23
24 p = SkipWhiteSpace( p, _encoding );
25+ if ( !p || !*p )
26+ {
27+ break;
28+ }
29 if ( StringEqual( p, "version", true, _encoding ) )
30 {
31 TiXmlAttribute attrib;
diff --git a/meta-oe/recipes-support/libtinyxml/libtinyxml_2.6.2.bb b/meta-oe/recipes-support/libtinyxml/libtinyxml_2.6.2.bb
index 0d18dd4a89..c99930f9e2 100644
--- a/meta-oe/recipes-support/libtinyxml/libtinyxml_2.6.2.bb
+++ b/meta-oe/recipes-support/libtinyxml/libtinyxml_2.6.2.bb
@@ -12,6 +12,7 @@ SRC_URI = "${SOURCEFORGE_MIRROR}/tinyxml/tinyxml_${@'${PV}'.replace('.', '_')}.t
12 file://enforce-use-stl.patch \ 12 file://enforce-use-stl.patch \
13 file://entity-encoding.patch \ 13 file://entity-encoding.patch \
14 file://CVE-2021-42260.patch \ 14 file://CVE-2021-42260.patch \
15 file://CVE-2023-34194.patch \
15" 16"
16SRC_URI[sha256sum] = "15bdfdcec58a7da30adc87ac2b078e4417dbe5392f3afb719f9ba6d062645593" 17SRC_URI[sha256sum] = "15bdfdcec58a7da30adc87ac2b078e4417dbe5392f3afb719f9ba6d062645593"
17 18