diff --git a/meta/recipes-core/libxml/libxml2.inc b/meta/recipes-core/libxml/libxml2.inc index 68437ae949..0c64edca3f 100644 --- a/meta/recipes-core/libxml/libxml2.inc +++ b/meta/recipes-core/libxml/libxml2.inc @@ -14,6 +14,7 @@ DEPENDS =+ "zlib" SRC_URI = "ftp://xmlsoft.org/libxml2/libxml2-${PV}.tar.gz \ file://libxml-64bit.patch \ + file://libxml2-CVE-2012-2871.patch \ file://ansidecl.patch" diff --git a/meta/recipes-core/libxml/libxml2/libxml2-CVE-2012-2871.patch b/meta/recipes-core/libxml/libxml2/libxml2-CVE-2012-2871.patch new file mode 100644 index 0000000000..3c66a9ca5e --- /dev/null +++ b/meta/recipes-core/libxml/libxml2/libxml2-CVE-2012-2871.patch @@ -0,0 +1,34 @@ +libxml2 CVE-2012-2871 + +the patch come from: +http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxml/src \ +/include/libxml/tree.h?r1=56276&r2=149930 + +libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, +does not properly support a cast of an unspecified variable during handling +of XSL transforms, which allows remote attackers to cause a denial of service +or possibly have unknown other impact via a crafted document, related to the +_xmlNs data structure in include/libxml/tree.h. + +http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2871 + +Signed-off-by: Li Wang