summaryrefslogtreecommitdiffstats
path: root/meta-oe/recipes-support/libyaml/libyaml_0.1.5.bb
Commit message (Collapse)AuthorAgeFilesLines
* libyaml: update from 0.1.5 to 0.1.6Wenzong Fan2015-05-221-21/+0
| | | | | | | | removed patch: - libyaml-CVE-2014-2525.patch (included by 0.1.6) Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* libyaml: add fix for CVE-2014-2525 Security AdvisoryKang Kai2014-11-071-1/+3
| | | | | | | | | | | | | Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2525 Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* libyaml: update to 0.1.5Kang Kai2014-04-201-0/+19
Update libyaml from 0.1.4 to latest version 0.1.5. Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>