386794d02e
Fixes the following security vulnerability: CVE-2019-15903: In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read. While we're at it, also change to use .tar.xz rather than the bigger .tar.bz2. Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
8 lines
380 B
Plaintext
8 lines
380 B
Plaintext
# From https://sourceforge.net/projects/expat/files/expat/2.2.8/
|
|
md5 cdf54239f892fc7914957f10de1e1c70 expat-2.2.8.tar.xz
|
|
sha1 500a848d7085df06020a86bf64c5f71c0052a080 expat-2.2.8.tar.xz
|
|
|
|
# Locally calculated
|
|
sha256 61caa81a49d858afb2031c7b1a25c97174e7f2009aa1ec4e1ffad2316b91779b expat-2.2.8.tar.xz
|
|
sha256 46336ab2fec900803e2f1a4253e325ac01d998efb09bc6906651f7259e636f76 COPYING
|