mirror of
https://git.yoctoproject.org/poky
synced 2026-02-14 04:33:03 +01:00
the patch come from: http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxml/src \ /include/libxml/tree.h?r1=56276&r2=149930 libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly support a cast of an unspecified variable during handling of XSL transforms, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document, related to the _xmlNs data structure in include/libxml/tree.h. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2871 [YOCTO #3580] [ CQID: WIND00376779 ] Upstream-Status: Pending (From OE-Core rev: bc601f96f34ad17a87f599b58e502ec1b2c13fa3) Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
10 lines
238 B
BlitzBasic
10 lines
238 B
BlitzBasic
require libxml2.inc
|
|
|
|
PR = "${INC_PR}.1"
|
|
|
|
SRC_URI[md5sum] = "5b9bebf4f5d2200ae2c4efe8fa6103f7"
|
|
SRC_URI[sha256sum] = "ad25d91958b7212abdc12b9611cfb4dc4e5cddb6d1e9891532f48aacee422b82"
|
|
|
|
SRC_URI += "file://libxml2-CVE-2012-2871.patch \
|
|
"
|