diff options
| author | wangmy <wangmy@fujitsu.com> | 2021-05-18 16:03:30 +0800 |
|---|---|---|
| committer | Khem Raj <raj.khem@gmail.com> | 2021-05-19 09:17:49 -0700 |
| commit | 8e63ac6c86852a12408c2415be073c71420758ff (patch) | |
| tree | aeb7f8c9d679371513540c89c44fabd8875b2447 /meta-python/recipes-devtools/python/python-systemd | |
| parent | f0d83c14d9064ce1ee19b92d95c8daf790fe7488 (diff) | |
| download | meta-openembedded-8e63ac6c86852a12408c2415be073c71420758ff.tar.gz | |
exiv2: Fix CVE-2021-29463
References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29463
The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.
An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2,
if they can trick the victim into running Exiv2 on a crafted image file.
Upstream-Status: Accepted [https://github.com/Exiv2/exiv2/commit/783b3a6ff15ed6f82a8f8e6c8a6f3b84a9b04d4b]
CVE: CVE-2021-29463
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python-systemd')
0 files changed, 0 insertions, 0 deletions
