libxml2: Fix for CVE-2022-49043

Upstream-Status: Backport [5a19e21605]

Reference:
https://access.redhat.com/security/cve/cve-2022-49043

(From OE-Core rev: 82b6c943bb6435171d1924cbebe794b901eb3705)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
This commit is contained in:
Vijay Anusuri
2025-02-13 12:24:47 +05:30
committed by Steve Sakoman
parent 0160cb7751
commit 553a8e2ab3
2 changed files with 39 additions and 0 deletions

View File

@@ -0,0 +1,38 @@
From 5a19e21605398cef6a8b1452477a8705cb41562b Mon Sep 17 00:00:00 2001
From: Nick Wellnhofer <wellnhofer@aevum.de>
Date: Wed, 2 Nov 2022 16:13:27 +0100
Subject: [PATCH] malloc-fail: Fix use-after-free in xmlXIncludeAddNode
Found with libFuzzer, see #344.
Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b]
CVE: CVE-2022-49043
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
---
xinclude.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/xinclude.c b/xinclude.c
index e5fdf0f..36fa8ec 100644
--- a/xinclude.c
+++ b/xinclude.c
@@ -612,14 +612,15 @@ xmlXIncludeAddNode(xmlXIncludeCtxtPtr ctxt, xmlNodePtr cur) {
}
URL = xmlSaveUri(uri);
xmlFreeURI(uri);
- xmlFree(URI);
if (URL == NULL) {
xmlXIncludeErr(ctxt, cur, XML_XINCLUDE_HREF_URI,
"invalid value URI %s\n", URI);
if (fragment != NULL)
xmlFree(fragment);
+ xmlFree(URI);
return(-1);
}
+ xmlFree(URI);
if (xmlStrEqual(URL, ctxt->doc->URL))
local = 1;
--
2.25.1

View File

@@ -33,6 +33,7 @@ SRC_URI += "http://www.w3.org/XML/Test/xmlts20080827.tar;subdir=${BP};name=testt
file://CVE-2023-45322-2.patch \
file://CVE-2024-25062.patch \
file://CVE-2024-34459.patch \
file://CVE-2022-49043.patch \
"
SRC_URI[archive.sha256sum] = "60d74a257d1ccec0475e749cba2f21559e48139efba6ff28224357c7c798dfee"