diff options
| author | Gyorgy Sarvari <skandigraun@gmail.com> | 2025-10-08 16:47:55 +0200 |
|---|---|---|
| committer | Gyorgy Sarvari <skandigraun@gmail.com> | 2025-10-13 09:21:31 +0200 |
| commit | 7907a3e206fb049e609996df8d09141bfb291fcd (patch) | |
| tree | e28a674b444b5e9d48abfa7d34b5ac1736a3a34a /meta-python/recipes-devtools/python/python-matplotlib | |
| parent | 7207c63b558f950bfe32cb6342ddd07723fb251b (diff) | |
| download | meta-openembedded-7907a3e206fb049e609996df8d09141bfb291fcd.tar.gz | |
exiv2: patch CVE-2025-26623
Details: https://nvd.nist.gov/vuln/detail/CVE-2025-26623
Apply the first to PRs from the relevant issue.
(The second PR adds a test, and the 3rd PR tries to reimplement
correctly the feature that introduced the vulnerability:
it is switching some raw pointers to smart pointers. It was not picked
because the
1. In the original issue it is stated that the first PR itself
fixes the vulnerability
2. The patch doesn't apply clean due to the time gap between our
and their version
3. The behavior of the application does not change
)
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python-matplotlib')
0 files changed, 0 insertions, 0 deletions
