| Message ID | 20260213154229.1329476-5-skandigraun@gmail.com |
|---|---|
| State | New |
| Headers | show |
| Series | [meta-networking,kirkstone,1/5] ez-ipupdate: patch CVE-2003-0887 | expand |
diff --git a/meta-oe/recipes-support/poppler/poppler/0001-JBIG2Stream-Fix-crash-on-broken-file.patch b/meta-oe/recipes-support/poppler/poppler/0001-JBIG2Stream-Fix-crash-on-broken-file.patch index 4a8ea233c8..3990f4766b 100644 --- a/meta-oe/recipes-support/poppler/poppler/0001-JBIG2Stream-Fix-crash-on-broken-file.patch +++ b/meta-oe/recipes-support/poppler/poppler/0001-JBIG2Stream-Fix-crash-on-broken-file.patch @@ -7,7 +7,7 @@ https://github.com/jeffssh/CVE-2021-30860 Thanks to David Warren for the heads up -CVE: CVE-2021-30860 +CVE: CVE-2021-30860 CVE-2022-38171 References: https://nvd.nist.gov/vuln/detail/CVE-2021-30860
Details: https://nvd.nist.gov/vuln/detail/CVE-2022-38171 This is the same as CVE-2021-30860, but that one was primarily filed against Apple software (and some other related projects). The patch that fixes this vulenrability is already added to the recipe, just extend its CVE tag Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> --- .../poppler/0001-JBIG2Stream-Fix-crash-on-broken-file.patch | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)