| Index: third_party/libxml/chromium/libxml2-2.9.4-security-CVE-2017-7375-xmlParsePEReference-xxe.patch
|
| diff --git a/third_party/libxml/chromium/libxml2-2.9.4-security-CVE-2017-7375-xmlParsePEReference-xxe.patch b/third_party/libxml/chromium/libxml2-2.9.4-security-CVE-2017-7375-xmlParsePEReference-xxe.patch
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..5548b880d1ba1121c5ccd1afc2f9729cbd7ad4b3
|
| --- /dev/null
|
| +++ b/third_party/libxml/chromium/libxml2-2.9.4-security-CVE-2017-7375-xmlParsePEReference-xxe.patch
|
| @@ -0,0 +1,19 @@
|
| +https://bugzilla.gnome.org/show_bug.cgi?id=780691
|
| +
|
| +--- src/parser.c
|
| ++++ src/parser.c
|
| +@@ -8130,6 +8130,14 @@ xmlParsePEReference(xmlParserCtxtPtr ctxt)
|
| + if (xmlPushInput(ctxt, input) < 0)
|
| + return;
|
| + } else {
|
| ++ if ((entity->etype == XML_EXTERNAL_PARAMETER_ENTITY) &&
|
| ++ ((ctxt->options & XML_PARSE_NOENT) == 0) &&
|
| ++ ((ctxt->options & XML_PARSE_DTDVALID) == 0) &&
|
| ++ ((ctxt->options & XML_PARSE_DTDLOAD) == 0) &&
|
| ++ ((ctxt->options & XML_PARSE_DTDATTR) == 0) &&
|
| ++ (ctxt->replaceEntities == 0) &&
|
| ++ (ctxt->validate == 0))
|
| ++ return;
|
| + /*
|
| + * TODO !!!
|
| + * handle the extra spaces added before and after
|
|
|