Message ID | 7e33aa25acc0c29b8f5e78757c6557e614eb1434.1643917717.git.steve@sakoman.com |
---|---|
State | Accepted, archived |
Commit | f79b134c1ad77d7f508f443c1d155c898620087f |
Headers | show |
Series | [dunfell,01/20] glibc: update to lastest 2.31 release HEAD | expand |
diff --git a/meta/recipes-core/expat/expat/CVE-2021-46143.patch b/meta/recipes-core/expat/expat/CVE-2021-46143.patch index d6bafba0ff..b1a726d9a8 100644 --- a/meta/recipes-core/expat/expat/CVE-2021-46143.patch +++ b/meta/recipes-core/expat/expat/CVE-2021-46143.patch @@ -4,6 +4,12 @@ Date: Sat, 25 Dec 2021 20:52:08 +0100 Subject: [PATCH] lib: Prevent integer overflow on m_groupSize in function doProlog (CVE-2021-46143) +Upstream-Status: Backport: +https://github.com/libexpat/libexpat/pull/538/commits/85ae9a2d7d0e9358f356b33977b842df8ebaec2b + +CVE: CVE-2021-46143 + +Signed-off-by: Steve Sakoman <steve@sakoman.com> --- expat/lib/xmlparse.c | 15 +++++++++++++++ 1 file changed, 15 insertions(+)
Signed-off-by: Steve Sakoman <steve@sakoman.com> --- meta/recipes-core/expat/expat/CVE-2021-46143.patch | 6 ++++++ 1 file changed, 6 insertions(+)