diff options
author | wangmy <wangmy@fujitsu.com> | 2021-05-18 16:03:29 +0800 |
---|---|---|
committer | Armin Kuster <akuster808@gmail.com> | 2021-05-22 16:13:38 -0700 |
commit | 6990c93dbd685f0b093fb65906f9471f63e4c635 (patch) | |
tree | c37833aeb2b64e19302799f0d26440f159217e55 /meta-python/recipes-devtools/python/python-systemd/0001-Provide-implementation-of-strndupa-for-musl.patch | |
parent | eee3b137a084d033994fd5eae31dafa74f880ed5 (diff) | |
download | meta-openembedded-6990c93dbd685f0b093fb65906f9471f63e4c635.tar.gz |
exiv2: Fix CVE-2021-29458
References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29458
The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.
An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2,
if they can trick the victim into running Exiv2 on a crafted image file.
Upstream-Status: Accepted [https://github.com/Exiv2/exiv2/pull/1536/commits/06d2db6e5fd2fcca9c060e95fc97f8a5b5d4c22d]
CVE: CVE-2021-29458
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit f0d83c14d9064ce1ee19b92d95c8daf790fe7488)
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python-systemd/0001-Provide-implementation-of-strndupa-for-musl.patch')
0 files changed, 0 insertions, 0 deletions