From mboxrd@z Thu Jan 1 00:00:00 1970 From: Thomas Petazzoni Date: Sat, 5 Nov 2016 23:31:30 +0100 Subject: [Buildroot] [PATCH] libxml2: add upstream security fixes In-Reply-To: References: Message-ID: <20161105233130.4789dd15@free-electrons.com> List-Id: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: buildroot@busybox.net Hello, On Sat, 5 Nov 2016 21:24:06 +0200, Baruch Siach wrote: > Fixes: CVE-2016-5131, CVE-2016-4658. > > Signed-off-by: Baruch Siach > --- > ...ix-XPointer-paths-beginning-with-range-to.patch | 178 +++++++++++++++ > ...sallow-namespace-nodes-in-XPointer-ranges.patch | 253 +++++++++++++++++++++ > 2 files changed, 431 insertions(+) > create mode 100644 package/libxml2/0001-Fix-XPointer-paths-beginning-with-range-to.patch > create mode 100644 package/libxml2/0002-Disallow-namespace-nodes-in-XPointer-ranges.patch Applied to master, thanks. Thomas -- Thomas Petazzoni, CTO, Free Electrons Embedded Linux, Kernel and Android engineering http://free-electrons.com