diff options
| author | Gustavo Zacarias <gustavo@zacarias.com.ar> | 2015-11-17 20:08:45 -0300 |
|---|---|---|
| committer | Thomas Petazzoni <thomas.petazzoni@free-electrons.com> | 2015-11-18 22:21:31 +0100 |
| commit | 97abbf210a9fbbddaec534faef7c6e86f0545bef (patch) | |
| tree | 7c8264010b06ca969ee35abfa8ccfc77ce1fb587 /package/libxml2/0008-fix-CVE-2015-8035.patch | |
| parent | 694fa0e332f8b3894a606619263c6ae38e4f6e20 (diff) | |
| download | buildroot-97abbf210a9fbbddaec534faef7c6e86f0545bef.tar.gz buildroot-97abbf210a9fbbddaec534faef7c6e86f0545bef.zip | |
libxml2: add several security patches
Fixes:
CVE-2015-1819 - The xmlreader in libxml allows remote attackers to cause
a denial of service (memory consumption) via crafted XML data, related
to an XML Entity Expansion (XEE) attack.
CVE-2015-7941 - out-of-bounds memory access.
CVE-2015-7942 - heap-buffer-overflow in xmlParseConditionalSections.
CVE-2015-8035 - DoS via crafted xz file.
All patches upstream.
Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
Diffstat (limited to 'package/libxml2/0008-fix-CVE-2015-8035.patch')
| -rw-r--r-- | package/libxml2/0008-fix-CVE-2015-8035.patch | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/package/libxml2/0008-fix-CVE-2015-8035.patch b/package/libxml2/0008-fix-CVE-2015-8035.patch new file mode 100644 index 0000000000..6673f3e2fe --- /dev/null +++ b/package/libxml2/0008-fix-CVE-2015-8035.patch @@ -0,0 +1,33 @@ +From f0709e3ca8f8947f2d91ed34e92e38a4c23eae63 Mon Sep 17 00:00:00 2001 +From: Daniel Veillard <veillard@redhat.com> +Date: Tue, 3 Nov 2015 15:31:25 +0800 +Subject: CVE-2015-8035 Fix XZ compression support loop + +For https://bugzilla.gnome.org/show_bug.cgi?id=757466 +DoS when parsing specially crafted XML document if XZ support +is compiled in (which wasn't the case for 2.9.2 and master since +Nov 2013, fixed in next commit !) + +Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> +--- + xzlib.c | 4 ++++ + 1 file changed, 4 insertions(+) + +diff --git a/xzlib.c b/xzlib.c +index 0dcb9f4..1fab546 100644 +--- a/xzlib.c ++++ b/xzlib.c +@@ -581,6 +581,10 @@ xz_decomp(xz_statep state) + xz_error(state, LZMA_DATA_ERROR, "compressed data error"); + return -1; + } ++ if (ret == LZMA_PROG_ERROR) { ++ xz_error(state, LZMA_PROG_ERROR, "compression error"); ++ return -1; ++ } + } while (strm->avail_out && ret != LZMA_STREAM_END); + + /* update available output and crc check value */ +-- +cgit v0.11.2 + |

