summaryrefslogtreecommitdiffstats
path: root/meta/classes/cve-check.bbclass
diff options
context:
space:
mode:
authorAndré Draszik <adraszik@tycoint.com>2016-11-04 11:06:31 +0000
committerRichard Purdie <richard.purdie@linuxfoundation.org>2017-01-11 17:21:41 +0000
commit53ad465b40a772c55e949448a33a06e5e781e7d4 (patch)
tree7697571c04ed2b0f66234ad92dd373f3b5f3f820 /meta/classes/cve-check.bbclass
parent2336faa9aa896c991f5de12b2f62d4bffe7d30d3 (diff)
downloadpoky-53ad465b40a772c55e949448a33a06e5e781e7d4.tar.gz
cve-check.bbclass: CVE-2014-2524 / readline v5.2
Contrary to the CVE report, the vulnerable trace functions don't exist in readline v5.2 (which we keep for GPLv2+ purposes), they were added in readline v6.0 only - let's whitelist that CVE in order to avoid false positives. See also the discussion in https://patchwork.openembedded.org/patch/81765/ (From OE-Core rev: b881a288eec598002685f68da80a24e0478fa496) (From OE-Core rev: b4498a6b734661fdfe3ff4e0a9850e796b72005c) Signed-off-by: André Draszik <adraszik@tycoint.com> Reviewed-by: Lukasz Nowak <lnowak@tycoint.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/classes/cve-check.bbclass')
-rw-r--r--meta/classes/cve-check.bbclass2
1 files changed, 1 insertions, 1 deletions
diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass
index 1425a40554..b0febfb2e5 100644
--- a/meta/classes/cve-check.bbclass
+++ b/meta/classes/cve-check.bbclass
@@ -39,7 +39,7 @@ CVE_CHECK_PN_WHITELIST = "\
39 39
40# Whitelist for CVE and version of package 40# Whitelist for CVE and version of package
41CVE_CHECK_CVE_WHITELIST = "{\ 41CVE_CHECK_CVE_WHITELIST = "{\
42 'CVE-2014-2524': ('6.3',), \ 42 'CVE-2014-2524': ('6.3','5.2',), \
43}" 43}"
44 44
45python do_cve_check () { 45python do_cve_check () {