summaryrefslogtreecommitdiffstats
path: root/meta-oe/recipes-support/libyaml/files
Commit message (Collapse)AuthorAgeFilesLines
* libyaml: remove the recipe due to its move to oe-coreAlexander Kanavin2015-09-231-32/+0
| | | | | Signed-off-by: Alexander Kanavin <alexander.kanavin@linux.intel.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* libyaml: Security Advisory - libyaml - CVE-2014-9130Yue Tao2015-05-221-0/+32
| | | | | | | | | | | | | https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9130 The patch comes from: https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2 Removed invalid simple key assertion (thank to Jonathan Gray) Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* libyaml: update from 0.1.5 to 0.1.6Wenzong Fan2015-05-221-42/+0
| | | | | | | | removed patch: - libyaml-CVE-2014-2525.patch (included by 0.1.6) Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* libyaml: add fix for CVE-2014-2525 Security AdvisoryKang Kai2014-11-071-0/+42
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2525 Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>