summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorArmin Kuster <akuster@mvista.com>2016-07-09 14:54:21 -0700
committerRichard Purdie <richard.purdie@linuxfoundation.org>2016-07-27 08:29:58 +0100
commit4cdca0571a9a1feb45a7aade7d86354935cc300c (patch)
treed327d51d2d300c8cadb59e85068afc758ef2e145
parent17480a956d7fcdf8aa01d3825b50595926dd1d4b (diff)
downloadpoky-4cdca0571a9a1feb45a7aade7d86354935cc300c.tar.gz
libxml2: Security fix for CVE-2016-1840
affects libxml2 < 2.9.4 (From OE-Core rev: 9d894179128771c4a2628c103f5c39e2e6ef13c5) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r--meta/recipes-core/libxml/libxml2/CVE-2016-1840.patch37
-rw-r--r--meta/recipes-core/libxml/libxml2_2.9.2.bb1
2 files changed, 38 insertions, 0 deletions
diff --git a/meta/recipes-core/libxml/libxml2/CVE-2016-1840.patch b/meta/recipes-core/libxml/libxml2/CVE-2016-1840.patch
new file mode 100644
index 0000000000..41de9f80d8
--- /dev/null
+++ b/meta/recipes-core/libxml/libxml2/CVE-2016-1840.patch
@@ -0,0 +1,37 @@
1From cbb271655cadeb8dbb258a64701d9a3a0c4835b4 Mon Sep 17 00:00:00 2001
2From: Pranjal Jumde <pjumde@apple.com>
3Date: Mon, 7 Mar 2016 06:34:26 -0800
4Subject: [PATCH] Bug 757711: heap-buffer-overflow in xmlFAParsePosCharGroup
5 <https://bugzilla.gnome.org/show_bug.cgi?id=757711>
6
7* xmlregexp.c:
8(xmlFAParseCharRange): Only advance to the next character if
9there is no error. Advancing to the next character in case of
10an error while parsing regexp leads to an out of bounds access.
11
12Upstream-Status: Backport
13CVE: CVE-2016-1840
14Signed-off-by: Armin Kuster <akuster@mvista.com>
15
16---
17 xmlregexp.c | 3 ++-
18 1 file changed, 2 insertions(+), 1 deletion(-)
19
20Index: libxml2-2.9.2/xmlregexp.c
21===================================================================
22--- libxml2-2.9.2.orig/xmlregexp.c
23+++ libxml2-2.9.2/xmlregexp.c
24@@ -5052,11 +5052,12 @@ xmlFAParseCharRange(xmlRegParserCtxtPtr
25 ERROR("Expecting the end of a char range");
26 return;
27 }
28- NEXTL(len);
29+
30 /* TODO check that the values are acceptable character ranges for XML */
31 if (end < start) {
32 ERROR("End of range is before start of range");
33 } else {
34+ NEXTL(len);
35 xmlRegAtomAddRange(ctxt, ctxt->atom, ctxt->neg,
36 XML_REGEXP_CHARVAL, start, end, NULL);
37 }
diff --git a/meta/recipes-core/libxml/libxml2_2.9.2.bb b/meta/recipes-core/libxml/libxml2_2.9.2.bb
index 41cba644fe..563661b1fd 100644
--- a/meta/recipes-core/libxml/libxml2_2.9.2.bb
+++ b/meta/recipes-core/libxml/libxml2_2.9.2.bb
@@ -8,6 +8,7 @@ SRC_URI += "file://CVE-2016-1762.patch \
8 file://CVE-2016-3705.patch \ 8 file://CVE-2016-3705.patch \
9 file://CVE-2016-1834.patch \ 9 file://CVE-2016-1834.patch \
10 file://CVE-2016-4483.patch \ 10 file://CVE-2016-4483.patch \
11 file://CVE-2016-1840.patch \
11 " 12 "
12 13
13SRC_URI[libtar.md5sum] = "9e6a9aca9d155737868b3dc5fd82f788" 14SRC_URI[libtar.md5sum] = "9e6a9aca9d155737868b3dc5fd82f788"