summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/ghostscript
diff options
context:
space:
mode:
authorRoss Burton <ross.burton@arm.com>2023-06-23 13:32:48 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2023-06-29 10:59:56 +0100
commita825e136fe3fb39ef08323437c74e2cb0b24200c (patch)
tree54828ee049598386ebcc4a8bc1dae0ed6176edd4 /meta/recipes-extended/ghostscript
parentf82c3bd37d62a3efc49fd33efa38a7f523e6c676 (diff)
downloadpoky-a825e136fe3fb39ef08323437c74e2cb0b24200c.tar.gz
ghostscript: remove CVE_CHECK_IGNORE for CVE-2013-6629
This CVE now has a version range, indicating that this Ghostscript release isn't vulnerable. (From OE-Core rev: da6d0763a7fb9c7a322bf5964f8abdf6bed7e219) Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/ghostscript')
-rw-r--r--meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb3
1 files changed, 0 insertions, 3 deletions
diff --git a/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb b/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb
index f03ebf4478..0d41242bc2 100644
--- a/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb
+++ b/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb
@@ -18,9 +18,6 @@ DEPENDS = "tiff jpeg fontconfig cups libpng freetype zlib"
18UPSTREAM_CHECK_URI = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases" 18UPSTREAM_CHECK_URI = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases"
19UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)\.tar" 19UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)\.tar"
20 20
21# We use a system libjpeg-turbo which has this fix
22CVE_CHECK_IGNORE += "CVE-2013-6629"
23
24def gs_verdir(v): 21def gs_verdir(v):
25 return "".join(v.split(".")) 22 return "".join(v.split("."))
26 23