libxml2: fix CVE-2014-0191
authorMaxin B. John <maxin.john@enea.com>
Wed, 7 May 2014 12:24:15 +0000 (14:24 +0200)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Thu, 8 May 2014 12:00:34 +0000 (13:00 +0100)
commite3f569c1988d6765e13455bff07510052b00e979
tree1fcbe80f7a10911fa8042d70a97b24fbe1ec42c9
parentcd4817c53537b163e1861b8dc151bfe1b55155b0
libxml2: fix CVE-2014-0191

It was discovered that libxml2, a library providing support to read,
modify and write XML files, incorrectly performs entity substituton in
the doctype prolog, even if the application using libxml2 disabled any
entity substitution. A remote attacker could provide a
specially-crafted XML file that, when processed, would lead to the
exhaustion of CPU and memory resources or file descriptors.

Reference: https://access.redhat.com/security/cve/CVE-2014-0191

(From OE-Core rev: 674bd59d5e357a4aba18c472ac21712a660a84af)

Signed-off-by: Maxin B. John <maxin.john@enea.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-core/libxml/libxml2.inc
meta/recipes-core/libxml/libxml2/libxml2-CVE-2014-0191-fix.patch [new file with mode: 0644]