Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | libyaml: update from 0.1.5 to 0.1.6 | Wenzong Fan | 2015-05-22 | 1 | -21/+0 |
| | | | | | | | | removed patch: - libyaml-CVE-2014-2525.patch (included by 0.1.6) Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> | ||||
* | libyaml: add fix for CVE-2014-2525 Security Advisory | Kang Kai | 2014-11-07 | 1 | -1/+3 |
| | | | | | | | | | | | | | Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2525 Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> | ||||
* | libyaml: update to 0.1.5 | Kang Kai | 2014-04-20 | 1 | -0/+19 |
Update libyaml from 0.1.4 to latest version 0.1.5. Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> |