diff options
author | Maxin B. John <maxin.john@enea.com> | 2014-05-07 14:24:15 +0200 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2014-05-08 13:00:23 +0100 |
commit | 674bd59d5e357a4aba18c472ac21712a660a84af (patch) | |
tree | 7ce74ef39d460f5ede9dac92250359d1ebd8bf00 /meta/recipes-extended/iputils | |
parent | fe19e4d13a645efccd778cfd3a7b55fe74498d60 (diff) | |
download | openembedded-core-674bd59d5e357a4aba18c472ac21712a660a84af.tar.gz openembedded-core-674bd59d5e357a4aba18c472ac21712a660a84af.tar.bz2 openembedded-core-674bd59d5e357a4aba18c472ac21712a660a84af.zip |
libxml2: fix CVE-2014-0191
It was discovered that libxml2, a library providing support to read,
modify and write XML files, incorrectly performs entity substituton in
the doctype prolog, even if the application using libxml2 disabled any
entity substitution. A remote attacker could provide a
specially-crafted XML file that, when processed, would lead to the
exhaustion of CPU and memory resources or file descriptors.
Reference: https://access.redhat.com/security/cve/CVE-2014-0191
Signed-off-by: Maxin B. John <maxin.john@enea.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Diffstat (limited to 'meta/recipes-extended/iputils')
0 files changed, 0 insertions, 0 deletions