summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSiddharth Doshi <sdoshi@mvista.com>2024-06-17 21:00:27 +0530
committerSteve Sakoman <steve@sakoman.com>2024-06-26 05:04:39 -0700
commite2366b9d09a8d68b0f4b9b98c4ddda6767352ad9 (patch)
tree31a6289d5dc02cfd098263c6b4eae18edbad2948
parentf27a1997b6f48f77c5085ce9b6572494e7dd864e (diff)
downloadpoky-e2366b9d09a8d68b0f4b9b98c4ddda6767352ad9.tar.gz
libxml2: Security fix for CVE-2024-34459
Upstream-Status: Backport from [https://gitlab.gnome.org/GNOME/libxml2/-/commit/2876ac5392a4e891b81e40e592c3ac6cb46016ce] CVE's Fixed: CVE-2024-34459 libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c (From OE-Core rev: b9f46d058854c0a6104a928b7b0b30d65fb87c2e) Signed-off-by: Siddharth Doshi <sdoshi@mvista.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r--meta/recipes-core/libxml/libxml2/CVE-2024-34459.patch30
-rw-r--r--meta/recipes-core/libxml/libxml2_2.9.14.bb1
2 files changed, 31 insertions, 0 deletions
diff --git a/meta/recipes-core/libxml/libxml2/CVE-2024-34459.patch b/meta/recipes-core/libxml/libxml2/CVE-2024-34459.patch
new file mode 100644
index 0000000000..96e3d3cfaf
--- /dev/null
+++ b/meta/recipes-core/libxml/libxml2/CVE-2024-34459.patch
@@ -0,0 +1,30 @@
1From 78fce372041d53cfeaaf2c11c71d07eef55ecfd1 Mon Sep 17 00:00:00 2001
2From: Nick Wellnhofer <wellnhofer@aevum.de>
3Date: Wed, 8 May 2024 11:49:31 +0200
4Subject: [PATCH] Fix buffer overread with `xmllint --htmlout`
5
6Add a missing bounds check.
7
8Upstream-Status: Backport from [https://gitlab.gnome.org/GNOME/libxml2/-/commit/2876ac5392a4e891b81e40e592c3ac6cb46016ce]
9CVE: CVE-2024-34459
10Signed-off-by: Siddharth Doshi <sdoshi@mvista.com>
11---
12 xmllint.c | 2 +-
13 1 file changed, 1 insertion(+), 1 deletion(-)
14
15diff --git a/xmllint.c b/xmllint.c
16index ee6bfdc..2f792f1 100644
17--- a/xmllint.c
18+++ b/xmllint.c
19@@ -602,7 +602,7 @@ xmlHTMLPrintFileContext(xmlParserInputPtr input) {
20 len = strlen(buffer);
21 snprintf(&buffer[len], sizeof(buffer) - len, "\n");
22 cur = input->cur;
23- while ((*cur == '\n') || (*cur == '\r'))
24+ while ((cur > base) && ((*cur == '\n') || (*cur == '\r')))
25 cur--;
26 n = 0;
27 while ((cur != base) && (n++ < 80)) {
28--
292.25.1
30
diff --git a/meta/recipes-core/libxml/libxml2_2.9.14.bb b/meta/recipes-core/libxml/libxml2_2.9.14.bb
index 2b7e9999d9..94b3b510ae 100644
--- a/meta/recipes-core/libxml/libxml2_2.9.14.bb
+++ b/meta/recipes-core/libxml/libxml2_2.9.14.bb
@@ -32,6 +32,7 @@ SRC_URI += "http://www.w3.org/XML/Test/xmlts20080827.tar;subdir=${BP};name=testt
32 file://CVE-2023-45322-1.patch \ 32 file://CVE-2023-45322-1.patch \
33 file://CVE-2023-45322-2.patch \ 33 file://CVE-2023-45322-2.patch \
34 file://CVE-2024-25062.patch \ 34 file://CVE-2024-25062.patch \
35 file://CVE-2024-34459.patch \
35 " 36 "
36 37
37SRC_URI[archive.sha256sum] = "60d74a257d1ccec0475e749cba2f21559e48139efba6ff28224357c7c798dfee" 38SRC_URI[archive.sha256sum] = "60d74a257d1ccec0475e749cba2f21559e48139efba6ff28224357c7c798dfee"