Go to file
wangmy 8ac1650275 exiv2: Fix CVE-2021-29470
References
      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29470

      The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file.
      An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2,
      if they can trick the victim into running Exiv2 on a crafted image file.

      Upstream-Status: Accepted [6628a69c03]
      CVE: CVE-2021-29470

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit bb1400efda)
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2021-05-22 16:13:38 -07:00
contrib tesseract: upgrade to 3.04 2016-10-21 18:20:43 +02:00
meta-filesystems fuse: Whitelisted CVE-2019-14860 2021-05-14 10:03:51 -07:00
meta-gnome gedit: Inherit python3targetconfig 2021-02-19 07:17:12 -08:00
meta-initramfs ubi-utils-klibc: Remove trailing slash from S 2020-11-09 18:56:22 -08:00
meta-multimedia libupnp: Fix CVE-2020-13848 2021-04-23 19:13:09 -07:00
meta-networking wireguard: fix build issue with updated 5.4 kernel 2021-04-07 08:55:15 -07:00
meta-oe exiv2: Fix CVE-2021-29470 2021-05-22 16:13:38 -07:00
meta-perl libnet-dns-perl: upgrade 1.23 -> 1.24 2020-06-12 09:32:24 -07:00
meta-python python3-pykwalify: Do not unset _PYTHON_SYSCONFIGDATA_NAME 2021-02-19 07:17:12 -08:00
meta-webserver packagegroup-meta-webserver: remove nostromo from pkg grp 2021-05-14 10:03:51 -07:00
meta-xfce thunar: upgrade 1.8.14 -> 1.8.15 2020-05-28 21:50:13 -07:00
.gitignore .gitignore: add *.pyc and *.pyo 2019-06-15 16:45:33 -07:00
COPYING.MIT add README and license for this layer 2011-02-13 16:47:32 +01:00
README README: updated Maintainers list for Dunfell 2020-05-05 16:47:34 -07:00

Collection of layers for the OE-core universe

dunfell maintainer: Armin Kuster  <akuster808@gmail.com>

This repository is a collection of layers to suppliment OE-Core
with additional packages, Each layer have designated maintainer
Please see the respective READMEs in the layer subdirectories