mirror of
https://git.yoctoproject.org/poky
synced 2026-01-29 21:08:42 +01:00
libxml2: Backport fix for CVE-2024-25062
Upstream-Status: Backport [31c6ce3b63&2b0aac140d] (From OE-Core rev: e4e621dc42be5dd158393fcadf5200f9eae613cb) Signed-off-by: Vijay Anusuri <vanusuri@mvista.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
This commit is contained in:
committed by
Steve Sakoman
parent
54d8a1f631
commit
8b77dd2bcf
38
meta/recipes-core/libxml/libxml2/CVE-2024-25062-pre1.patch
Normal file
38
meta/recipes-core/libxml/libxml2/CVE-2024-25062-pre1.patch
Normal file
@@ -0,0 +1,38 @@
|
||||
From 31c6ce3b63f8a494ad9e31ca65187a73d8ad3508 Mon Sep 17 00:00:00 2001
|
||||
From: Nick Wellnhofer <wellnhofer@aevum.de>
|
||||
Date: Mon, 9 Nov 2020 17:55:44 +0100
|
||||
Subject: [PATCH] Avoid call stack overflow with XML reader and recursive
|
||||
XIncludes
|
||||
|
||||
Don't process XIncludes in the result of another inclusion to avoid
|
||||
infinite recursion resulting in a call stack overflow.
|
||||
|
||||
This is something the XInclude engine shouldn't allow but correct
|
||||
handling of intra-document includes would require major changes.
|
||||
|
||||
Found by OSS-Fuzz.
|
||||
|
||||
Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libxml2/-/commit/31c6ce3b63f8a494ad9e31ca65187a73d8ad3508]
|
||||
CVE: CVE-2024-25062 #Dependency Patch
|
||||
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
|
||||
---
|
||||
xmlreader.c | 3 ++-
|
||||
1 file changed, 2 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/xmlreader.c b/xmlreader.c
|
||||
index 01adf74f4..72e40b032 100644
|
||||
--- a/xmlreader.c
|
||||
+++ b/xmlreader.c
|
||||
@@ -1585,7 +1585,8 @@ node_found:
|
||||
/*
|
||||
* Handle XInclude if asked for
|
||||
*/
|
||||
- if ((reader->xinclude) && (reader->node != NULL) &&
|
||||
+ if ((reader->xinclude) && (reader->in_xinclude == 0) &&
|
||||
+ (reader->node != NULL) &&
|
||||
(reader->node->type == XML_ELEMENT_NODE) &&
|
||||
(reader->node->ns != NULL) &&
|
||||
((xmlStrEqual(reader->node->ns->href, XINCLUDE_NS)) ||
|
||||
--
|
||||
GitLab
|
||||
|
||||
33
meta/recipes-core/libxml/libxml2/CVE-2024-25062.patch
Normal file
33
meta/recipes-core/libxml/libxml2/CVE-2024-25062.patch
Normal file
@@ -0,0 +1,33 @@
|
||||
From 2b0aac140d739905c7848a42efc60bfe783a39b7 Mon Sep 17 00:00:00 2001
|
||||
From: Nick Wellnhofer <wellnhofer@aevum.de>
|
||||
Date: Sat, 14 Oct 2023 22:45:54 +0200
|
||||
Subject: [PATCH] [CVE-2024-25062] xmlreader: Don't expand XIncludes when
|
||||
backtracking
|
||||
|
||||
Fixes a use-after-free if XML Reader if used with DTD validation and
|
||||
XInclude expansion.
|
||||
|
||||
Fixes #604.
|
||||
|
||||
Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libxml2/-/commit/2b0aac140d739905c7848a42efc60bfe783a39b7]
|
||||
CVE: CVE-2024-25062
|
||||
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
|
||||
---
|
||||
xmlreader.c | 1 +
|
||||
1 file changed, 1 insertion(+)
|
||||
|
||||
diff --git a/xmlreader.c b/xmlreader.c
|
||||
index 979385a13..fefd68e0b 100644
|
||||
--- a/xmlreader.c
|
||||
+++ b/xmlreader.c
|
||||
@@ -1443,6 +1443,7 @@ node_found:
|
||||
* Handle XInclude if asked for
|
||||
*/
|
||||
if ((reader->xinclude) && (reader->in_xinclude == 0) &&
|
||||
+ (reader->state != XML_TEXTREADER_BACKTRACK) &&
|
||||
(reader->node != NULL) &&
|
||||
(reader->node->type == XML_ELEMENT_NODE) &&
|
||||
(reader->node->ns != NULL) &&
|
||||
--
|
||||
GitLab
|
||||
|
||||
@@ -44,6 +44,8 @@ SRC_URI += "http://www.w3.org/XML/Test/xmlts20080827.tar.gz;subdir=${BP};name=te
|
||||
file://CVE-2021-3516.patch \
|
||||
file://CVE-2023-45322-1.patch \
|
||||
file://CVE-2023-45322-2.patch \
|
||||
file://CVE-2024-25062-pre1.patch \
|
||||
file://CVE-2024-25062.patch \
|
||||
"
|
||||
|
||||
SRC_URI[archive.sha256sum] = "593b7b751dd18c2d6abcd0c4bcb29efc203d0b4373a6df98e3a455ea74ae2813"
|
||||
|
||||
Reference in New Issue
Block a user