summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/unzip/unzip_6.0.bb
diff options
context:
space:
mode:
authorRichard Purdie <richard.purdie@linuxfoundation.org>2021-05-11 12:42:21 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2021-05-20 12:36:41 +0100
commitdbcc366e844ca0f68253d50ba0d8fe628222d954 (patch)
treea39c16879ad0a76e767dc92d0259363ef24b55ae /meta/recipes-extended/unzip/unzip_6.0.bb
parent53ba676278e1105f96695a17426c4b29357a978f (diff)
downloadpoky-dbcc366e844ca0f68253d50ba0d8fe628222d954.tar.gz
unzip: Exclude CVE-2008-0888 from cve-check
The patch mentioned as the fix for the CVE is applied to the 6.0 source code. Zip versioning makes CPE entry changes hard. (From OE-Core rev: 4ff9d2c57d9cade1faa3916f171e5ad96ee32487) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 8917e5ae2bb44d017fc0155f16632c5decadb0bd) Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/unzip/unzip_6.0.bb')
-rw-r--r--meta/recipes-extended/unzip/unzip_6.0.bb3
1 files changed, 3 insertions, 0 deletions
diff --git a/meta/recipes-extended/unzip/unzip_6.0.bb b/meta/recipes-extended/unzip/unzip_6.0.bb
index 0c56a39d92..af5530ab38 100644
--- a/meta/recipes-extended/unzip/unzip_6.0.bb
+++ b/meta/recipes-extended/unzip/unzip_6.0.bb
@@ -32,6 +32,9 @@ UPSTREAM_VERSION_UNKNOWN = "1"
32SRC_URI[md5sum] = "62b490407489521db863b523a7f86375" 32SRC_URI[md5sum] = "62b490407489521db863b523a7f86375"
33SRC_URI[sha256sum] = "036d96991646d0449ed0aa952e4fbe21b476ce994abc276e49d30e686708bd37" 33SRC_URI[sha256sum] = "036d96991646d0449ed0aa952e4fbe21b476ce994abc276e49d30e686708bd37"
34 34
35# Patch from https://bugzilla.redhat.com/attachment.cgi?id=293893&action=diff applied to 6.0 source
36CVE_CHECK_WHITELIST += "CVE-2008-0888"
37
35# exclude version 5.5.2 which triggers a false positive 38# exclude version 5.5.2 which triggers a false positive
36UPSTREAM_CHECK_REGEX = "unzip(?P<pver>(?!552).+)\.tgz" 39UPSTREAM_CHECK_REGEX = "unzip(?P<pver>(?!552).+)\.tgz"
37 40