mailarchive of the ptxdist mailing list
 help / color / mirror / Atom feed
From: Michael Olbrich <m.olbrich@pengutronix.de>
To: ptxdist@pengutronix.de
Cc: Alexander Dahl <ada@thorsis.com>
Subject: Re: [ptxdist] [APPLIED] libxml2: version bump 2.9.10 -> 2.9.12
Date: Thu, 27 May 2021 08:45:48 +0200	[thread overview]
Message-ID: <20210527064548.4043070-1-m.olbrich@pengutronix.de> (raw)
In-Reply-To: <20210517160447.95609-2-ada@thorsis.com>

Thanks, applied as 03aeef516da3c961a26de8b56d0b8e0596a4f62a.

Michael

[sent from post-receive hook]

On Thu, 27 May 2021 08:45:47 +0200, Alexander Dahl <ada@thorsis.com> wrote:
> Fixes quite some security and other issues.  License text change was a
> small typo only.  Two patches removed have gone upstream.
> 
> Signed-off-by: Alexander Dahl <ada@thorsis.com>
> Link: https://mail.gnome.org/archives/xml/2021-May/msg00000.html
> Link: https://mail.gnome.org/archives/xml/2021-May/msg00003.html
> Message-Id: <20210517160447.95609-2-ada@thorsis.com>
> Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
> 
> diff --git a/patches/libxml2-2.9.10/0001-Fix-infinite-loop-in-xmlStringLenDecodeEntities.patch b/patches/libxml2-2.9.10/0001-Fix-infinite-loop-in-xmlStringLenDecodeEntities.patch
> deleted file mode 100644
> index 59c8647310bb..000000000000
> --- a/patches/libxml2-2.9.10/0001-Fix-infinite-loop-in-xmlStringLenDecodeEntities.patch
> +++ /dev/null
> @@ -1,28 +0,0 @@
> -From: Zhipeng Xie <xiezhipeng1@huawei.com>
> -Date: Thu, 12 Dec 2019 17:30:55 +0800
> -Subject: [PATCH] Fix infinite loop in xmlStringLenDecodeEntities
> -
> -When ctxt->instate == XML_PARSER_EOF,xmlParseStringEntityRef
> -return NULL which cause a infinite loop in xmlStringLenDecodeEntities
> -
> -Found with libFuzzer.
> -
> -Signed-off-by: Zhipeng Xie <xiezhipeng1@huawei.com>
> ----
> - parser.c | 3 ++-
> - 1 file changed, 2 insertions(+), 1 deletion(-)
> -
> -diff --git a/parser.c b/parser.c
> -index d1c319631fc9..a34bb6cdd81b 100644
> ---- a/parser.c
> -+++ b/parser.c
> -@@ -2646,7 +2646,8 @@ xmlStringLenDecodeEntities(xmlParserCtxtPtr ctxt, const xmlChar *str, int len,
> -     else
> -         c = 0;
> -     while ((c != 0) && (c != end) && /* non input consuming loop */
> --	   (c != end2) && (c != end3)) {
> -+           (c != end2) && (c != end3) &&
> -+           (ctxt->instate != XML_PARSER_EOF)) {
> - 
> - 	if (c == 0) break;
> -         if ((c == '&') && (str[1] == '#')) {
> diff --git a/patches/libxml2-2.9.10/0002-Fix-memory-leak-in-xmlSchemaValidateStream.patch b/patches/libxml2-2.9.10/0002-Fix-memory-leak-in-xmlSchemaValidateStream.patch
> deleted file mode 100644
> index 1ca08621799a..000000000000
> --- a/patches/libxml2-2.9.10/0002-Fix-memory-leak-in-xmlSchemaValidateStream.patch
> +++ /dev/null
> @@ -1,29 +0,0 @@
> -From: Zhipeng Xie <xiezhipeng1@huawei.com>
> -Date: Tue, 20 Aug 2019 16:33:06 +0800
> -Subject: [PATCH] Fix memory leak in xmlSchemaValidateStream
> -
> -When ctxt->schema is NULL, xmlSchemaSAXPlug->xmlSchemaPreRun
> -alloc a new schema for ctxt->schema and set vctxt->xsiAssemble
> -to 1. Then xmlSchemaVStart->xmlSchemaPreRun initialize
> -vctxt->xsiAssemble to 0 again which cause the alloced schema
> -can not be freed anymore.
> -
> -Found with libFuzzer.
> -
> -Signed-off-by: Zhipeng Xie <xiezhipeng1@huawei.com>
> ----
> - xmlschemas.c | 1 -
> - 1 file changed, 1 deletion(-)
> -
> -diff --git a/xmlschemas.c b/xmlschemas.c
> -index d19de6df5f50..59495c2738ab 100644
> ---- a/xmlschemas.c
> -+++ b/xmlschemas.c
> -@@ -28095,7 +28095,6 @@ xmlSchemaPreRun(xmlSchemaValidCtxtPtr vctxt) {
> -     vctxt->nberrors = 0;
> -     vctxt->depth = -1;
> -     vctxt->skipDepth = -1;
> --    vctxt->xsiAssemble = 0;
> -     vctxt->hasKeyrefs = 0;
> - #ifdef ENABLE_IDC_NODE_TABLES_TEST
> -     vctxt->createIDCNodeTables = 1;
> diff --git a/patches/libxml2-2.9.10/series b/patches/libxml2-2.9.10/series
> deleted file mode 100644
> index fed72960d3b0..000000000000
> --- a/patches/libxml2-2.9.10/series
> +++ /dev/null
> @@ -1,8 +0,0 @@
> -# generated by git-ptx-patches
> -#tag:base --start-number 1
> -#tag:upstream --start-number 1
> -0001-Fix-infinite-loop-in-xmlStringLenDecodeEntities.patch
> -0002-Fix-memory-leak-in-xmlSchemaValidateStream.patch
> -#tag:ptx --start-number 200
> -0200-xml2-config-is-not-SYSROOT-aware.patch
> -# d6f49636e8813a3a9e46758f352fc667  - git-ptx-patches magic
> diff --git a/patches/libxml2-2.9.10/0200-xml2-config-is-not-SYSROOT-aware.patch b/patches/libxml2-2.9.12/0200-xml2-config-is-not-SYSROOT-aware.patch
> similarity index 100%
> rename from patches/libxml2-2.9.10/0200-xml2-config-is-not-SYSROOT-aware.patch
> rename to patches/libxml2-2.9.12/0200-xml2-config-is-not-SYSROOT-aware.patch
> diff --git a/patches/libxml2-2.9.12/series b/patches/libxml2-2.9.12/series
> new file mode 100644
> index 000000000000..05ba5ddea3dd
> --- /dev/null
> +++ b/patches/libxml2-2.9.12/series
> @@ -0,0 +1,6 @@
> +# generated by git-ptx-patches
> +#tag:base --start-number 1
> +#tag:upstream --start-number 1
> +#tag:ptx --start-number 200
> +0200-xml2-config-is-not-SYSROOT-aware.patch
> +# b6720be956d1b4619bc1c347a0ceb1dd  - git-ptx-patches magic
> diff --git a/rules/libxml2.make b/rules/libxml2.make
> index 1da248307b18..9eb1993b07c1 100644
> --- a/rules/libxml2.make
> +++ b/rules/libxml2.make
> @@ -16,8 +16,8 @@ PACKAGES-$(PTXCONF_LIBXML2) += libxml2
>  #
>  # Paths and names
>  #
> -LIBXML2_VERSION	:= 2.9.10
> -LIBXML2_MD5	:= 10942a1dc23137a8aa07f0639cbfece5
> +LIBXML2_VERSION	:= 2.9.12
> +LIBXML2_MD5	:= f433a39be087a9f0b197eb2307ad9f75
>  LIBXML2		:= libxml2-$(LIBXML2_VERSION)
>  LIBXML2_SUFFIX	:= tar.gz
>  LIBXML2_SOURCE	:= $(SRCDIR)/$(LIBXML2).$(LIBXML2_SUFFIX)
> @@ -26,7 +26,7 @@ LIBXML2_LICENSE	:= MIT AND ISC
>  # The file 'COPYING' is just a symlink on the file 'Copyright'
>  LIBXML2_LICENSE_FILES := \
>  	file://Copyright;md5=2044417e2e5006b65a8b9067b683fcf1 \
> -	file://hash.c;startline=6;endline=15;md5=96f7296605eae807670fb08947829969
> +	file://hash.c;startline=6;endline=15;md5=e77f77b12cb69e203d8b4090a0eee879
>  
>  LIBXML2_URL := \
>  	ftp://xmlsoft.org/libxml2/$(LIBXML2).$(LIBXML2_SUFFIX) \

_______________________________________________
ptxdist mailing list
ptxdist@pengutronix.de
To unsubscribe, send a mail with subject "unsubscribe" to ptxdist-request@pengutronix.de


  reply	other threads:[~2021-05-27  6:47 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-05-17 16:04 [ptxdist] [PATCH 0/2] libxml2/libxslt version bumps Alexander Dahl
2021-05-17 16:04 ` [ptxdist] [PATCH 1/2] libxml2: version bump 2.9.10 -> 2.9.12 Alexander Dahl
2021-05-27  6:45   ` Michael Olbrich [this message]
2021-05-17 16:04 ` [ptxdist] [PATCH 2/2] libxslt: version bump 1.1.29 -> 1.1.34 Alexander Dahl
2021-05-27  6:45   ` [ptxdist] [APPLIED] " Michael Olbrich

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20210527064548.4043070-1-m.olbrich@pengutronix.de \
    --to=m.olbrich@pengutronix.de \
    --cc=ada@thorsis.com \
    --cc=ptxdist@pengutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox