diff options
| author | wangmy <wangmy@fujitsu.com> | 2021-05-18 16:03:31 +0800 |
|---|---|---|
| committer | Khem Raj <raj.khem@gmail.com> | 2021-05-19 09:17:49 -0700 |
| commit | 9e7c2c9713dc2824af2a33b0a3feb4f29e7f0269 (patch) | |
| tree | a74860fa5dfaf6bae768c12e8d1f827a41e607d0 /meta-python/recipes-devtools/python/python3-scrypt | |
| parent | 8e63ac6c86852a12408c2415be073c71420758ff (diff) | |
| download | meta-openembedded-9e7c2c9713dc2824af2a33b0a3feb4f29e7f0269.tar.gz | |
exiv2: Fix CVE-2021-3482
References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3482
Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp
can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data.
Upstream-Status: Accepted [https://github.com/Exiv2/exiv2/pull/1523/commits/22ea582c6b74ada30bec3a6b15de3c3e52f2b4da]
CVE: CVE-2021-3482
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-scrypt')
0 files changed, 0 insertions, 0 deletions
