summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python-matplotlib
diff options
context:
space:
mode:
authorGyorgy Sarvari <skandigraun@gmail.com>2025-10-08 16:47:55 +0200
committerGyorgy Sarvari <skandigraun@gmail.com>2025-10-13 09:21:31 +0200
commit7907a3e206fb049e609996df8d09141bfb291fcd (patch)
treee28a674b444b5e9d48abfa7d34b5ac1736a3a34a /meta-python/recipes-devtools/python/python-matplotlib
parent7207c63b558f950bfe32cb6342ddd07723fb251b (diff)
downloadmeta-openembedded-7907a3e206fb049e609996df8d09141bfb291fcd.tar.gz
exiv2: patch CVE-2025-26623
Details: https://nvd.nist.gov/vuln/detail/CVE-2025-26623 Apply the first to PRs from the relevant issue. (The second PR adds a test, and the 3rd PR tries to reimplement correctly the feature that introduced the vulnerability: it is switching some raw pointers to smart pointers. It was not picked because the 1. In the original issue it is stated that the first PR itself fixes the vulnerability 2. The patch doesn't apply clean due to the time gap between our and their version 3. The behavior of the application does not change ) Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python-matplotlib')
0 files changed, 0 insertions, 0 deletions