Files
Gyorgy Sarvari b81ba45156 exiv2: mark CVE-2026-27631 patched
Details: https://nvd.nist.gov/vuln/detail/CVE-2026-27631

Though NVD indicates that 0.28.8 is still vulnerable, that does
not seem to be the case: the fix that is referenced by the advisory
has been backported[1] to this verison. Due to this, mark this
CVE as patched.

[1]: https://github.com/Exiv2/exiv2/commit/21d129c842212c198dd887dbaafc5ce734e9dfad

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2026-03-18 14:33:32 -07:00

41 lines
1.3 KiB
BlitzBasic

SUMMARY = "Exif, Iptc and XMP metadata manipulation library and tools"
LICENSE = "GPL-2.0-only"
LIC_FILES_CHKSUM = "file://COPYING;md5=625f055f41728f84a8d7938acc35bdc2"
DEPENDS = "zlib expat brotli libinih"
SRC_URI = "git://github.com/Exiv2/exiv2.git;protocol=https;branch=0.28.x;tag=v${PV} \
file://run-ptest \
file://0001-Use-automake-output-for-tests.patch \
file://0001-Allow-test-data-path-configuration.patch \
"
SRCREV = "2cd987a731236037b6b78cbff897d08685a8ef49"
inherit cmake gettext ptest
PACKAGECONFIG ??= "${@bb.utils.contains('PTEST_ENABLED', '1', 'test unittest', '', d)}"
PACKAGECONFIG[test] = "-DEXIV2_BUILD_SAMPLES=ON -DEXIV2_ENABLE_WEBREADY=ON"
PACKAGECONFIG[unittest] = "-DEXIV2_BUILD_UNIT_TESTS=ON -DTEST_FOLDER=${PTEST_PATH},,googletest"
RDEPENDS:${PN}-ptest += " \
python3-html \
python3-json \
python3-lxml \
python3-multiprocessing \
python3-shell \
python3-unittest \
python3-unittest-automake-output"
do_install_ptest(){
cp -r ${S}/tests ${D}${PTEST_PATH}/
cp -r ${S}/test ${D}${PTEST_PATH}/
install -d ${D}${PTEST_PATH}/build/bin
install ${B}/bin/* ${D}${PTEST_PATH}/build/bin
install -d ${D}${PTEST_PATH}/src
install ${S}/src/canonmn_int.cpp ${D}${PTEST_PATH}/src
}
CVE_STATUS[CVE-2026-27631] = "fixed-version: fixed in 0.28.8"