diff options
author | Li Wang <li.wang@windriver.com> | 2012-12-13 13:54:21 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2012-12-17 17:24:56 +0000 |
commit | 8780c5ddf2916bbd42fc67b79c286652aebb1546 (patch) | |
tree | face220bc9eb7628a8660319afbbf2d265af0358 /meta | |
parent | 4371e8f68a20987f35394fb4222271702d7c6380 (diff) | |
download | poky-8780c5ddf2916bbd42fc67b79c286652aebb1546.tar.gz |
libxml2 CVE-2012-2871
the patch come from:
http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxml/src \
/include/libxml/tree.h?r1=56276&r2=149930
libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89,
does not properly support a cast of an unspecified variable during handling
of XSL transforms, which allows remote attackers to cause a denial of service
or possibly have unknown other impact via a crafted document, related to the
_xmlNs data structure in include/libxml/tree.h.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2871
[YOCTO #3580]
[ CQID: WIND00376779 ]
Upstream-Status: Pending
(From OE-Core rev: bc601f96f34ad17a87f599b58e502ec1b2c13fa3)
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r-- | meta/recipes-core/libxml/libxml2/libxml2-CVE-2012-2871.patch | 34 | ||||
-rw-r--r-- | meta/recipes-core/libxml/libxml2_2.9.0.bb | 5 |
2 files changed, 38 insertions, 1 deletions
diff --git a/meta/recipes-core/libxml/libxml2/libxml2-CVE-2012-2871.patch b/meta/recipes-core/libxml/libxml2/libxml2-CVE-2012-2871.patch new file mode 100644 index 0000000000..3c66a9ca5e --- /dev/null +++ b/meta/recipes-core/libxml/libxml2/libxml2-CVE-2012-2871.patch | |||
@@ -0,0 +1,34 @@ | |||
1 | libxml2 CVE-2012-2871 | ||
2 | |||
3 | the patch come from: | ||
4 | http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxml/src \ | ||
5 | /include/libxml/tree.h?r1=56276&r2=149930 | ||
6 | |||
7 | libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, | ||
8 | does not properly support a cast of an unspecified variable during handling | ||
9 | of XSL transforms, which allows remote attackers to cause a denial of service | ||
10 | or possibly have unknown other impact via a crafted document, related to the | ||
11 | _xmlNs data structure in include/libxml/tree.h. | ||
12 | |||
13 | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2871 | ||
14 | |||
15 | Signed-off-by: Li Wang <li.wang@windriver.com> | ||
16 | --- | ||
17 | include/libxml/tree.h | 1 + | ||
18 | 1 files changed, 1 insertions(+), 0 deletions(-) | ||
19 | |||
20 | diff --git a/include/libxml/tree.h b/include/libxml/tree.h | ||
21 | index b733589..5422dda 100644 | ||
22 | --- a/include/libxml/tree.h | ||
23 | +++ b/include/libxml/tree.h | ||
24 | @@ -351,6 +351,7 @@ struct _xmlNs { | ||
25 | struct _xmlNs *next; /* next Ns link for this node */ | ||
26 | xmlNsType type; /* global or local */ | ||
27 | const xmlChar *href; /* URL for the namespace */ | ||
28 | + const char *dummy_children; /* lines up with node->children */ | ||
29 | const xmlChar *prefix; /* prefix for the namespace */ | ||
30 | void *_private; /* application data */ | ||
31 | struct _xmlDoc *context; /* normally an xmlDoc */ | ||
32 | -- | ||
33 | 1.7.0.5 | ||
34 | |||
diff --git a/meta/recipes-core/libxml/libxml2_2.9.0.bb b/meta/recipes-core/libxml/libxml2_2.9.0.bb index a022ae90aa..ecc19fbcbb 100644 --- a/meta/recipes-core/libxml/libxml2_2.9.0.bb +++ b/meta/recipes-core/libxml/libxml2_2.9.0.bb | |||
@@ -1,6 +1,9 @@ | |||
1 | require libxml2.inc | 1 | require libxml2.inc |
2 | 2 | ||
3 | PR = "${INC_PR}.0" | 3 | PR = "${INC_PR}.1" |
4 | 4 | ||
5 | SRC_URI[md5sum] = "5b9bebf4f5d2200ae2c4efe8fa6103f7" | 5 | SRC_URI[md5sum] = "5b9bebf4f5d2200ae2c4efe8fa6103f7" |
6 | SRC_URI[sha256sum] = "ad25d91958b7212abdc12b9611cfb4dc4e5cddb6d1e9891532f48aacee422b82" | 6 | SRC_URI[sha256sum] = "ad25d91958b7212abdc12b9611cfb4dc4e5cddb6d1e9891532f48aacee422b82" |
7 | |||
8 | SRC_URI += "file://libxml2-CVE-2012-2871.patch \ | ||
9 | " | ||