Thanks, applied as f7958126d135935d23893290fe1ed69b2cd17df4.

Michael

[sent from post-receive hook]

On Fri, 28 Oct 2022 16:44:27 +0200, Christian Melki 
<christian.me...@t2data.com> wrote:
> https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.3
> Plugs CVEs:
> [CVE-2022-40303] Fix integer overflows with XML_PARSE_HUGE
> [CVE-2022-40304] Fix dict corruption caused by entity reference cycles
> 
> * Forward patchset. Applies cleanly.
> 
> Signed-off-by: Christian Melki <christian.me...@t2data.com>
> Message-Id: <20221020124901.2581876-1-christian.me...@t2data.com>
> Signed-off-by: Michael Olbrich <m.olbr...@pengutronix.de>
> 
> diff --git 
> a/patches/libxml2-2.10.2/0200-xml2-config-is-not-SYSROOT-aware.patch 
> b/patches/libxml2-2.10.3/0200-xml2-config-is-not-SYSROOT-aware.patch
> similarity index 100%
> rename from patches/libxml2-2.10.2/0200-xml2-config-is-not-SYSROOT-aware.patch
> rename to patches/libxml2-2.10.3/0200-xml2-config-is-not-SYSROOT-aware.patch
> diff --git a/patches/libxml2-2.10.2/series b/patches/libxml2-2.10.3/series
> similarity index 100%
> rename from patches/libxml2-2.10.2/series
> rename to patches/libxml2-2.10.3/series
> diff --git a/rules/libxml2.make b/rules/libxml2.make
> index be6e9d60a279..16df57460164 100644
> --- a/rules/libxml2.make
> +++ b/rules/libxml2.make
> @@ -16,8 +16,8 @@ PACKAGES-$(PTXCONF_LIBXML2) += libxml2
>  #
>  # Paths and names
>  #
> -LIBXML2_VERSION      := 2.10.2
> -LIBXML2_MD5  := 5ffd0cd047056d5699b3363c635582bc
> +LIBXML2_VERSION      := 2.10.3
> +LIBXML2_MD5  := f9edac7fac232b3657a003fd9a5bbe42
>  LIBXML2              := libxml2-$(LIBXML2_VERSION)
>  LIBXML2_SUFFIX       := tar.xz
>  LIBXML2_SOURCE       := $(SRCDIR)/$(LIBXML2).$(LIBXML2_SUFFIX)

Reply via email to