Details: https://nvd.nist.gov/vuln/detail/CVE-2022-38171

This is the same as CVE-2021-30860, but that one was primarily filed
against Apple software (and some other related projects).

The patch that fixes this vulenrability is already added to the recipe,
just extend its CVE tag

Signed-off-by: Gyorgy Sarvari <[email protected]>
---
 .../poppler/0001-JBIG2Stream-Fix-crash-on-broken-file.patch     | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git 
a/meta-oe/recipes-support/poppler/poppler/0001-JBIG2Stream-Fix-crash-on-broken-file.patch
 
b/meta-oe/recipes-support/poppler/poppler/0001-JBIG2Stream-Fix-crash-on-broken-file.patch
index 4a8ea233c8..3990f4766b 100644
--- 
a/meta-oe/recipes-support/poppler/poppler/0001-JBIG2Stream-Fix-crash-on-broken-file.patch
+++ 
b/meta-oe/recipes-support/poppler/poppler/0001-JBIG2Stream-Fix-crash-on-broken-file.patch
@@ -7,7 +7,7 @@ https://github.com/jeffssh/CVE-2021-30860
 
 Thanks to David Warren for the heads up
 
-CVE: CVE-2021-30860
+CVE: CVE-2021-30860 CVE-2022-38171
 
 References:
 https://nvd.nist.gov/vuln/detail/CVE-2021-30860
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#124394): 
https://lists.openembedded.org/g/openembedded-devel/message/124394
Mute This Topic: https://lists.openembedded.org/mt/117794334/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to