A lightweight RPC library based on XML and HTTP
CVE-2023-52425 is a DoS where extremely large tags can cause significant processing delays. It isn't reasonably possible to backport the fix but while testing the impact it was determined that a large ctags could cause a segmentation fault. That is what is addressed. Resolves: RHEL-24226 |
||
---|---|---|
.gitignore | ||
0001-add-meson-buildsystem-definitions.patch | ||
0001-Remove-trace-statements-accidentally-committed-with-.patch | ||
0001-xmlrpc_server_abyss-use-va_args-properly.patch | ||
0002-chmod-x-xml-rpc-api2txt.patch | ||
0002-Use-proper-datatypes-for-long-long.patch | ||
0003-allow-30x-redirections.patch | ||
0004-Add-missing-validation-of-encoding-CVE-2022-25235.patch | ||
0005-lib-Prevent-more-integer-overflows-CVE-2022-22822-to.patch | ||
0006-Prevent-integer-overflow-on-m_groupSize-in-doProlog-.patch | ||
0007-Address-segfault-found-in-CVE-2023-52425.patch | ||
sources | ||
xmlrpc-c.spec |