From bf6c30908948b7bc9be1206fe88c09dc3f526387 Mon Sep 17 00:00:00 2001 From: Sona Sarmadi Date: Tue, 3 Nov 2015 09:06:31 +0100 Subject: libxml2: CVE-2015-7942 Fixes heap-based buffer overflow in xmlParseConditionalSections(). Upstream patch: https://git.gnome.org/browse/libxml2/commit/ ?id=9b8512337d14c8ddf662fcb98b0135f225a1c489 Upstream bug: https://bugzilla.gnome.org/show_bug.cgi?id=756456 Signed-off-by: Sona Sarmadi Signed-off-by: Tudor Florea --- meta/recipes-core/libxml/libxml2.inc | 1 + 1 file changed, 1 insertion(+) (limited to 'meta/recipes-core/libxml/libxml2.inc') diff --git a/meta/recipes-core/libxml/libxml2.inc b/meta/recipes-core/libxml/libxml2.inc index 840a8eb006..15a2421c38 100644 --- a/meta/recipes-core/libxml/libxml2.inc +++ b/meta/recipes-core/libxml/libxml2.inc @@ -23,6 +23,7 @@ SRC_URI = "ftp://xmlsoft.org/libxml2/libxml2-${PV}.tar.gz;name=libtar \ file://libxml-m4-use-pkgconfig.patch \ file://libxml2-CVE-2014-3660.patch \ file://0001-CVE-2015-1819-Enforce-the-reader-to-run-in-constant-.patch \ + file://CVE-2015-7942.patch \ " BINCONFIG = "${bindir}/xml2-config" -- cgit v1.2.3-54-g00ecf