diff options
author | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-05-11 12:42:21 +0100 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-05-12 23:06:05 +0100 |
commit | a6e8f4163ce855e06628e3257711f3383cbdd871 (patch) | |
tree | fe4a77abf238803fd68d40b477ce8f6ab9312ade /meta/recipes-extended | |
parent | 8efb104e7b80c38b764b57efa8cbe15259762e33 (diff) | |
download | poky-a6e8f4163ce855e06628e3257711f3383cbdd871.tar.gz |
unzip: Exclude CVE-2008-0888 from cve-check
The patch mentioned as the fix for the CVE is applied to the 6.0 source
code. Zip versioning makes CPE entry changes hard.
(From OE-Core rev: 8917e5ae2bb44d017fc0155f16632c5decadb0bd)
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended')
-rw-r--r-- | meta/recipes-extended/unzip/unzip_6.0.bb | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/meta/recipes-extended/unzip/unzip_6.0.bb b/meta/recipes-extended/unzip/unzip_6.0.bb index ec69508eea..40f0346f8d 100644 --- a/meta/recipes-extended/unzip/unzip_6.0.bb +++ b/meta/recipes-extended/unzip/unzip_6.0.bb | |||
@@ -33,6 +33,9 @@ UPSTREAM_VERSION_UNKNOWN = "1" | |||
33 | SRC_URI[md5sum] = "62b490407489521db863b523a7f86375" | 33 | SRC_URI[md5sum] = "62b490407489521db863b523a7f86375" |
34 | SRC_URI[sha256sum] = "036d96991646d0449ed0aa952e4fbe21b476ce994abc276e49d30e686708bd37" | 34 | SRC_URI[sha256sum] = "036d96991646d0449ed0aa952e4fbe21b476ce994abc276e49d30e686708bd37" |
35 | 35 | ||
36 | # Patch from https://bugzilla.redhat.com/attachment.cgi?id=293893&action=diff applied to 6.0 source | ||
37 | CVE_CHECK_WHITELIST += "CVE-2008-0888" | ||
38 | |||
36 | # exclude version 5.5.2 which triggers a false positive | 39 | # exclude version 5.5.2 which triggers a false positive |
37 | UPSTREAM_CHECK_REGEX = "unzip(?P<pver>(?!552).+)\.tgz" | 40 | UPSTREAM_CHECK_REGEX = "unzip(?P<pver>(?!552).+)\.tgz" |
38 | 41 | ||