summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-django/CVE-2023-36053.patch
diff options
context:
space:
mode:
authorYogita Urade <yogita.urade@windriver.com>2023-08-18 10:36:39 +0000
committerArmin Kuster <akuster808@gmail.com>2023-08-25 10:43:04 -0400
commit99a5eb7a173377c20fc5822896272b0f21edffe0 (patch)
treeabc498915a4a0600e53d053b3bfa512869ee9e5f /meta-python/recipes-devtools/python/python3-django/CVE-2023-36053.patch
parentdee77065c84d51c84e33d34965667f3c4dd047d6 (diff)
downloadmeta-openembedded-99a5eb7a173377c20fc5822896272b0f21edffe0.tar.gz
poppler: fix CVE-2023-34872
A vulnerability in Outline.cc for Poppler prior to 23.06.0 allows a remote attacker to cause a Denial of Service (DoS) (crash) via a crafted PDF file in OutlineItem::open. Reference: https://gitlab.freedesktop.org/poppler/poppler/-/issues/1399 Signed-off-by: Yogita Urade <yogita.urade@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-django/CVE-2023-36053.patch')
0 files changed, 0 insertions, 0 deletions