diff options
author | Scott Murray <scott.murray@konsulko.com> | 2020-12-30 17:44:17 -0500 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-01-12 14:25:13 +0000 |
commit | 2df017eb7756d49af4eddc7b19b42150ae5df8d2 (patch) | |
tree | e9e81cff82292b32acc7141fa9d817bb1798c5aa /meta | |
parent | ada7232e51e1ad0707490cdb0e822e1631e8b2eb (diff) | |
download | poky-2df017eb7756d49af4eddc7b19b42150ae5df8d2.tar.gz |
grub: fix "CVE:" line in one of the patches
The "CVE:" line in the patch for CVEs 2020-14309, CVE-2020-14310, and
CVE-2020-14311 had commas between the CVE numbers, which resulted in
CVE-2020-14310 not being picked up as patched by cve-check.bbclass's
parsing. Remove the commas to match cve-check.bbclass's expectations.
(From OE-Core rev: f8aa7314f98748ecb7a9abc6702e795ae50b97a6)
Signed-off-by: Scott Murray <scott.murray@konsulko.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 396d5c0f9cffa4b54ae94738b1ef2b6fb545f082)
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r-- | meta/recipes-bsp/grub/files/CVE-2020-14309-CVE-2020-14310-CVE-2020-14311-malloc-Use-overflow-checking-primitives-where-we-do-.patch | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/meta/recipes-bsp/grub/files/CVE-2020-14309-CVE-2020-14310-CVE-2020-14311-malloc-Use-overflow-checking-primitives-where-we-do-.patch b/meta/recipes-bsp/grub/files/CVE-2020-14309-CVE-2020-14310-CVE-2020-14311-malloc-Use-overflow-checking-primitives-where-we-do-.patch index 896a2145d4..7214ead9a7 100644 --- a/meta/recipes-bsp/grub/files/CVE-2020-14309-CVE-2020-14310-CVE-2020-14311-malloc-Use-overflow-checking-primitives-where-we-do-.patch +++ b/meta/recipes-bsp/grub/files/CVE-2020-14309-CVE-2020-14310-CVE-2020-14311-malloc-Use-overflow-checking-primitives-where-we-do-.patch | |||
@@ -30,7 +30,7 @@ Signed-off-by: Peter Jones <pjones@redhat.com> | |||
30 | Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> | 30 | Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> |
31 | 31 | ||
32 | Upstream-Status: Backport | 32 | Upstream-Status: Backport |
33 | CVE: CVE-2020-14309, CVE-2020-14310, CVE-2020-14311 | 33 | CVE: CVE-2020-14309 CVE-2020-14310 CVE-2020-14311 |
34 | 34 | ||
35 | Reference to upstream patch: | 35 | Reference to upstream patch: |
36 | https://git.savannah.gnu.org/cgit/grub.git/commit/?id=3f05d693d1274965ffbe4ba99080dc2c570944c6 | 36 | https://git.savannah.gnu.org/cgit/grub.git/commit/?id=3f05d693d1274965ffbe4ba99080dc2c570944c6 |