summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python-flask-sijax.inc
diff options
context:
space:
mode:
authorwangmy <wangmy@fujitsu.com>2021-05-18 16:03:31 +0800
committerArmin Kuster <akuster808@gmail.com>2021-05-22 16:13:38 -0700
commitbe0cc5e79b98a9c47f5bb8915f6c411484d0d6f2 (patch)
treeb59904d638a287e5b28932f6ace9e88379d85d9a /meta-python/recipes-devtools/python/python-flask-sijax.inc
parentf38ed30c08e5d5b2ef6c6cc9bce2304506dddc83 (diff)
downloadmeta-openembedded-be0cc5e79b98a9c47f5bb8915f6c411484d0d6f2.tar.gz
exiv2: Fix CVE-2021-3482
References https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3482 Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data. Upstream-Status: Accepted [https://github.com/Exiv2/exiv2/pull/1523/commits/22ea582c6b74ada30bec3a6b15de3c3e52f2b4da] CVE: CVE-2021-3482 Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> (cherry picked from commit 9e7c2c9713dc2824af2a33b0a3feb4f29e7f0269) Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python-flask-sijax.inc')
0 files changed, 0 insertions, 0 deletions