diff options
-rw-r--r-- | meta/recipes-core/libxml/libxml2/libxml2-CVE-2012-2871.patch | 34 | ||||
-rw-r--r-- | meta/recipes-core/libxml/libxml2_2.9.0.bb | 2 |
2 files changed, 0 insertions, 36 deletions
diff --git a/meta/recipes-core/libxml/libxml2/libxml2-CVE-2012-2871.patch b/meta/recipes-core/libxml/libxml2/libxml2-CVE-2012-2871.patch deleted file mode 100644 index 3c66a9ca5e..0000000000 --- a/meta/recipes-core/libxml/libxml2/libxml2-CVE-2012-2871.patch +++ /dev/null @@ -1,34 +0,0 @@ -libxml2 CVE-2012-2871 - -the patch come from: -http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxml/src \ -/include/libxml/tree.h?r1=56276&r2=149930 - -libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, -does not properly support a cast of an unspecified variable during handling -of XSL transforms, which allows remote attackers to cause a denial of service -or possibly have unknown other impact via a crafted document, related to the -_xmlNs data structure in include/libxml/tree.h. - -http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2871 - -Signed-off-by: Li Wang <li.wang@windriver.com> ---- - include/libxml/tree.h | 1 + - 1 files changed, 1 insertions(+), 0 deletions(-) - -diff --git a/include/libxml/tree.h b/include/libxml/tree.h -index b733589..5422dda 100644 ---- a/include/libxml/tree.h -+++ b/include/libxml/tree.h -@@ -351,6 +351,7 @@ struct _xmlNs { - struct _xmlNs *next; /* next Ns link for this node */ - xmlNsType type; /* global or local */ - const xmlChar *href; /* URL for the namespace */ -+ const char *dummy_children; /* lines up with node->children */ - const xmlChar *prefix; /* prefix for the namespace */ - void *_private; /* application data */ - struct _xmlDoc *context; /* normally an xmlDoc */ --- -1.7.0.5 - diff --git a/meta/recipes-core/libxml/libxml2_2.9.0.bb b/meta/recipes-core/libxml/libxml2_2.9.0.bb index ecc19fbcbb..55ecbeb7e4 100644 --- a/meta/recipes-core/libxml/libxml2_2.9.0.bb +++ b/meta/recipes-core/libxml/libxml2_2.9.0.bb @@ -5,5 +5,3 @@ PR = "${INC_PR}.1" SRC_URI[md5sum] = "5b9bebf4f5d2200ae2c4efe8fa6103f7" SRC_URI[sha256sum] = "ad25d91958b7212abdc12b9611cfb4dc4e5cddb6d1e9891532f48aacee422b82" -SRC_URI += "file://libxml2-CVE-2012-2871.patch \ - " |