diff options
author | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-05-11 12:42:21 +0100 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-05-20 12:36:41 +0100 |
commit | dbcc366e844ca0f68253d50ba0d8fe628222d954 (patch) | |
tree | a39c16879ad0a76e767dc92d0259363ef24b55ae /meta/recipes-extended/unzip/unzip_6.0.bb | |
parent | 53ba676278e1105f96695a17426c4b29357a978f (diff) | |
download | poky-dbcc366e844ca0f68253d50ba0d8fe628222d954.tar.gz |
unzip: Exclude CVE-2008-0888 from cve-check
The patch mentioned as the fix for the CVE is applied to the 6.0 source
code. Zip versioning makes CPE entry changes hard.
(From OE-Core rev: 4ff9d2c57d9cade1faa3916f171e5ad96ee32487)
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 8917e5ae2bb44d017fc0155f16632c5decadb0bd)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/unzip/unzip_6.0.bb')
-rw-r--r-- | meta/recipes-extended/unzip/unzip_6.0.bb | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/meta/recipes-extended/unzip/unzip_6.0.bb b/meta/recipes-extended/unzip/unzip_6.0.bb index 0c56a39d92..af5530ab38 100644 --- a/meta/recipes-extended/unzip/unzip_6.0.bb +++ b/meta/recipes-extended/unzip/unzip_6.0.bb | |||
@@ -32,6 +32,9 @@ UPSTREAM_VERSION_UNKNOWN = "1" | |||
32 | SRC_URI[md5sum] = "62b490407489521db863b523a7f86375" | 32 | SRC_URI[md5sum] = "62b490407489521db863b523a7f86375" |
33 | SRC_URI[sha256sum] = "036d96991646d0449ed0aa952e4fbe21b476ce994abc276e49d30e686708bd37" | 33 | SRC_URI[sha256sum] = "036d96991646d0449ed0aa952e4fbe21b476ce994abc276e49d30e686708bd37" |
34 | 34 | ||
35 | # Patch from https://bugzilla.redhat.com/attachment.cgi?id=293893&action=diff applied to 6.0 source | ||
36 | CVE_CHECK_WHITELIST += "CVE-2008-0888" | ||
37 | |||
35 | # exclude version 5.5.2 which triggers a false positive | 38 | # exclude version 5.5.2 which triggers a false positive |
36 | UPSTREAM_CHECK_REGEX = "unzip(?P<pver>(?!552).+)\.tgz" | 39 | UPSTREAM_CHECK_REGEX = "unzip(?P<pver>(?!552).+)\.tgz" |
37 | 40 | ||