package/expat: security bump to version 2.2.8
authorPeter Korsgaard <peter@korsgaard.com>
Sun, 15 Sep 2019 20:21:42 +0000 (22:21 +0200)
committerThomas Petazzoni <thomas.petazzoni@bootlin.com>
Sun, 15 Sep 2019 20:22:18 +0000 (22:22 +0200)
commit386794d02ef030e14adfabc5056b54a338bd717f
treea59181dc7ac9b06b7b3c157c0d930cb920d17765
parent0ebdc82ca61150644d15eee74f920c4e8dfd6b30
package/expat: security bump to version 2.2.8

Fixes the following security vulnerability:

CVE-2019-15903: In libexpat before 2.2.8, crafted XML input could fool the
parser into changing from DTD parsing to document parsing too early; a
consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber)
then resulted in a heap-based buffer over-read.

While we're at it, also change to use .tar.xz rather than the bigger
.tar.bz2.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
package/expat/expat.hash
package/expat/expat.mk