Gyorgy Sarvari 1571c1a8e5
streamripper: ignore CVE-2020-37065
Details: https://nvd.nist.gov/vuln/detail/CVE-2020-37065

The vulnerability is about a 3rd party Windows-only GUI frontend for
the streamripper library, and not for the CLI application that the
recipe builds. Due to this ignore this CVE.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2026-02-24 22:30:29 -08:00
..
2021-08-03 10:21:25 -07:00
2025-12-24 13:19:13 -08:00
2012-02-24 13:53:17 +01:00

This layer depends on:

URI: git://git.openembedded.org/openembedded-core branch: master

URI: git://git.openembedded.org/meta-openembedded layers: meta-oe branch: master

Send pull requests to openembedded-devel@lists.openembedded.org with '[meta-multimedia]' in the subject

When sending single patches, please use something like: git send-email -M -1 --to openembedded-devel@lists.openembedded.org --subject-prefix='meta-multimedia][PATCH'

You are encouraged to fork the mirror on github https://github.com/openembedded/meta-openembedded to share your patches, this is preferred for patch sets consisting of more than one patch. Other services like GitLab, repo.or.cz or self hosted setups are of course accepted as well, 'git fetch ' works the same on all of them. We recommend github because it is free, easy to use, has been proven to be reliable and has a really good web GUI.

Layer maintainer: Khem Raj raj.khem@gmail.com