summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLi Wang <li.wang@windriver.com>2012-12-13 05:54:21 (GMT)
committerRichard Purdie <richard.purdie@linuxfoundation.org>2013-02-14 15:19:52 (GMT)
commitbf471a1aa905fb9b8bfa2d8d57fc56b119483693 (patch)
tree81c254188a677af5922e7939789108b4c9c3fb33
parent54dd30e514412198734e8ddf56fca98f078e4fc1 (diff)
downloadpoky-bf471a1aa905fb9b8bfa2d8d57fc56b119483693.tar.gz
libxml2 CVE-2012-2871
the patch come from: http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxml/src \ /include/libxml/tree.h?r1=56276&r2=149930 libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly support a cast of an unspecified variable during handling of XSL transforms, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document, related to the _xmlNs data structure in include/libxml/tree.h. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2871 [YOCTO #3580] [ CQID: WIND00376779 ] Upstream-Status: Pending (From OE-Core rev: 6d4453ce06191c09787e65d3b6a704651608d8b7) Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r--meta/recipes-core/libxml/libxml2.inc1
-rw-r--r--meta/recipes-core/libxml/libxml2/libxml2-CVE-2012-2871.patch34
-rw-r--r--meta/recipes-core/libxml/libxml2_2.8.0.bb2
3 files changed, 36 insertions, 1 deletions
diff --git a/meta/recipes-core/libxml/libxml2.inc b/meta/recipes-core/libxml/libxml2.inc
index 68437ae..0c64edc 100644
--- a/meta/recipes-core/libxml/libxml2.inc
+++ b/meta/recipes-core/libxml/libxml2.inc
@@ -14,6 +14,7 @@ DEPENDS =+ "zlib"
14 14
15SRC_URI = "ftp://xmlsoft.org/libxml2/libxml2-${PV}.tar.gz \ 15SRC_URI = "ftp://xmlsoft.org/libxml2/libxml2-${PV}.tar.gz \
16 file://libxml-64bit.patch \ 16 file://libxml-64bit.patch \
17 file://libxml2-CVE-2012-2871.patch \
17 file://ansidecl.patch" 18 file://ansidecl.patch"
18 19
19 20
diff --git a/meta/recipes-core/libxml/libxml2/libxml2-CVE-2012-2871.patch b/meta/recipes-core/libxml/libxml2/libxml2-CVE-2012-2871.patch
new file mode 100644
index 0000000..3c66a9c
--- /dev/null
+++ b/meta/recipes-core/libxml/libxml2/libxml2-CVE-2012-2871.patch
@@ -0,0 +1,34 @@
1libxml2 CVE-2012-2871
2
3the patch come from:
4http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxml/src \
5/include/libxml/tree.h?r1=56276&r2=149930
6
7libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89,
8does not properly support a cast of an unspecified variable during handling
9of XSL transforms, which allows remote attackers to cause a denial of service
10or possibly have unknown other impact via a crafted document, related to the
11_xmlNs data structure in include/libxml/tree.h.
12
13http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2871
14
15Signed-off-by: Li Wang <li.wang@windriver.com>
16---
17 include/libxml/tree.h | 1 +
18 1 files changed, 1 insertions(+), 0 deletions(-)
19
20diff --git a/include/libxml/tree.h b/include/libxml/tree.h
21index b733589..5422dda 100644
22--- a/include/libxml/tree.h
23+++ b/include/libxml/tree.h
24@@ -351,6 +351,7 @@ struct _xmlNs {
25 struct _xmlNs *next; /* next Ns link for this node */
26 xmlNsType type; /* global or local */
27 const xmlChar *href; /* URL for the namespace */
28+ const char *dummy_children; /* lines up with node->children */
29 const xmlChar *prefix; /* prefix for the namespace */
30 void *_private; /* application data */
31 struct _xmlDoc *context; /* normally an xmlDoc */
32--
331.7.0.5
34
diff --git a/meta/recipes-core/libxml/libxml2_2.8.0.bb b/meta/recipes-core/libxml/libxml2_2.8.0.bb
index 37eba34..e38cf2c 100644
--- a/meta/recipes-core/libxml/libxml2_2.8.0.bb
+++ b/meta/recipes-core/libxml/libxml2_2.8.0.bb
@@ -1,6 +1,6 @@
1require libxml2.inc 1require libxml2.inc
2 2
3PR = "r2" 3PR = "r3"
4 4
5SRC_URI[md5sum] = "c62106f02ee00b6437f0fb9d370c1093" 5SRC_URI[md5sum] = "c62106f02ee00b6437f0fb9d370c1093"
6SRC_URI[sha256sum] = "f2e2d0e322685193d1affec83b21dc05d599e17a7306d7b90de95bb5b9ac622a" 6SRC_URI[sha256sum] = "f2e2d0e322685193d1affec83b21dc05d599e17a7306d7b90de95bb5b9ac622a"