Go to file
Gyorgy Sarvari 3ee544e759
python3-twitter: mark CVE-2012-5825 patched
Details: https://nvd.nist.gov/vuln/detail/CVE-2012-5825

The Debian bugtracker[1] indicated that the issue is tracked by
upstream in github[2] (with a difference CVE ID, but same issue),
where the vulnerability was confirmed. Later in the same github issue
the solution is confirmed: the project switched to use the requests
library, which doesn't suffer from this vulnerability.

Due to this mark the CVE as patched.

[1]: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692444
[2]: https://github.com/tweepy/tweepy/issues/279

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2026-01-12 08:53:48 -08:00
contrib
meta-filesystems overlayfs-tools: upgrade 2024.07 -> 2025.01 2025-12-28 08:14:38 -08:00
meta-gnome gnome-disk-utility: remove outdated patch 2026-01-12 08:53:48 -08:00
meta-initramfs initramfs-kexecboot-image: Allow supported architectures 2025-12-31 08:28:50 -08:00
meta-multimedia libopenmpt: upgrade 0.7.10 -> 0.8.4 2025-12-25 07:53:23 -08:00
meta-networking tcpdump: upgrade 4.99.5 -> 4.99.6 2026-01-12 08:53:45 -08:00
meta-oe libcereal: set CVE_PRODUCT 2026-01-12 08:53:48 -08:00
meta-perl libio-socket-ssl-perl: upgrade 2.095 -> 2.096 2026-01-12 08:53:43 -08:00
meta-python python3-twitter: mark CVE-2012-5825 patched 2026-01-12 08:53:48 -08:00
meta-webserver nginx: set CVE_PRODUCT 2026-01-04 11:34:49 -08:00
meta-xfce xfce4-settings: rename libcanberra rrecommends 2026-01-12 08:53:48 -08:00
.b4-config Add toplevel b4 config file 2025-04-10 08:31:06 -07:00
.gitignore
COPYING.MIT
README.md layers: Move READMEs to markdown format 2023-06-17 08:30:01 -07:00

Collection of layers for the OE-core universe

Main layer maintainer: Khem Raj raj.khem@gmail.com

This repository is a collection of layers to suppliment OE-Core with additional packages, Each layer have designated maintainer Please see the respective READMEs in the layer subdirectories