diff options
author | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-05-11 12:42:21 +0100 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-05-22 10:01:03 +0100 |
commit | e6c8fcc1c022d4d36a971531f1a5f42fce7cd516 (patch) | |
tree | 49258db31aed88651fb4ddcd29c3d9fd96d5c092 /meta/recipes-extended/unzip | |
parent | 03b6c50c3da659790c656802fe3c4882113966ac (diff) | |
download | poky-e6c8fcc1c022d4d36a971531f1a5f42fce7cd516.tar.gz |
unzip: Exclude CVE-2008-0888 from cve-check
The patch mentioned as the fix for the CVE is applied to the 6.0 source
code. Zip versioning makes CPE entry changes hard.
(From OE-Core rev: f816be9387d4691dbacd17673749809fe125d35c)
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/unzip')
-rw-r--r-- | meta/recipes-extended/unzip/unzip_6.0.bb | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/meta/recipes-extended/unzip/unzip_6.0.bb b/meta/recipes-extended/unzip/unzip_6.0.bb index 0c56a39d92..af5530ab38 100644 --- a/meta/recipes-extended/unzip/unzip_6.0.bb +++ b/meta/recipes-extended/unzip/unzip_6.0.bb | |||
@@ -32,6 +32,9 @@ UPSTREAM_VERSION_UNKNOWN = "1" | |||
32 | SRC_URI[md5sum] = "62b490407489521db863b523a7f86375" | 32 | SRC_URI[md5sum] = "62b490407489521db863b523a7f86375" |
33 | SRC_URI[sha256sum] = "036d96991646d0449ed0aa952e4fbe21b476ce994abc276e49d30e686708bd37" | 33 | SRC_URI[sha256sum] = "036d96991646d0449ed0aa952e4fbe21b476ce994abc276e49d30e686708bd37" |
34 | 34 | ||
35 | # Patch from https://bugzilla.redhat.com/attachment.cgi?id=293893&action=diff applied to 6.0 source | ||
36 | CVE_CHECK_WHITELIST += "CVE-2008-0888" | ||
37 | |||
35 | # exclude version 5.5.2 which triggers a false positive | 38 | # exclude version 5.5.2 which triggers a false positive |
36 | UPSTREAM_CHECK_REGEX = "unzip(?P<pver>(?!552).+)\.tgz" | 39 | UPSTREAM_CHECK_REGEX = "unzip(?P<pver>(?!552).+)\.tgz" |
37 | 40 | ||