diff options
| author | Divya Chellam <divya.chellam@windriver.com> | 2025-07-16 16:48:49 +0530 |
|---|---|---|
| committer | Steve Sakoman <steve@sakoman.com> | 2025-07-21 09:18:00 -0700 |
| commit | e63738d6b1542888e4c0bc1a9302ba11c4f873f5 (patch) | |
| tree | 745a9e718b1e8e4eb462ee42d03a5fe92ba50c54 /scripts/patchtest | |
| parent | 4a37001c6a4fcdfb6b8fb5627f555e6b9b8c010a (diff) | |
| download | poky-e63738d6b1542888e4c0bc1a9302ba11c4f873f5.tar.gz | |
libxml2: fix CVE-2025-49795
A NULL pointer dereference vulnerability was found in libxml2 when
processing XPath XML expressions. This flaw allows an attacker to
craft a malicious XML input to libxml2, leading to a denial of service.
Pick commit from 2.13 branch
Reference:
https://security-tracker.debian.org/tracker/CVE-2025-49795
Upstream-patch:
https://gitlab.gnome.org/GNOME/libxml2/-/commit/62048278a4c5fdf14d287dfb400005c0a0caa69f
(From OE-Core rev: 9f17e0911eeb49e007de8ee3e50d9f3f38e08a26)
Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'scripts/patchtest')
0 files changed, 0 insertions, 0 deletions
