mirror of
https://github.com/godotengine/buildroot.git
synced 2026-01-05 14:09:53 +03:00
Fixes: CVE-2015-1819 - The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack. CVE-2015-7941 - out-of-bounds memory access. CVE-2015-7942 - heap-buffer-overflow in xmlParseConditionalSections. CVE-2015-8035 - DoS via crafted xz file. All patches upstream. Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
35 lines
1.2 KiB
Diff
35 lines
1.2 KiB
Diff
From a7dfab7411cbf545f359dd3157e5df1eb0e7ce31 Mon Sep 17 00:00:00 2001
|
|
From: Daniel Veillard <veillard@redhat.com>
|
|
Date: Mon, 23 Feb 2015 11:17:35 +0800
|
|
Subject: Stop parsing on entities boundaries errors
|
|
|
|
For https://bugzilla.gnome.org/show_bug.cgi?id=744980
|
|
|
|
There are times, like on unterminated entities that it's preferable to
|
|
stop parsing, even if that means less error reporting. Entities are
|
|
feeding the parser on further processing, and if they are ill defined
|
|
then it's possible to get the parser to bug. Also do the same on
|
|
Conditional Sections if the input is broken, as the structure of
|
|
the document can't be guessed.
|
|
|
|
Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
|
|
---
|
|
parser.c | 1 +
|
|
1 file changed, 1 insertion(+)
|
|
|
|
diff --git a/parser.c b/parser.c
|
|
index a8d1b67..bbe97eb 100644
|
|
--- a/parser.c
|
|
+++ b/parser.c
|
|
@@ -5658,6 +5658,7 @@ xmlParseEntityDecl(xmlParserCtxtPtr ctxt) {
|
|
if (RAW != '>') {
|
|
xmlFatalErrMsgStr(ctxt, XML_ERR_ENTITY_NOT_FINISHED,
|
|
"xmlParseEntityDecl: entity %s not terminated\n", name);
|
|
+ xmlStopParser(ctxt);
|
|
} else {
|
|
if (input != ctxt->input) {
|
|
xmlFatalErrMsg(ctxt, XML_ERR_ENTITY_BOUNDARY,
|
|
--
|
|
cgit v0.11.2
|
|
|