From a6e8f4163ce855e06628e3257711f3383cbdd871 Mon Sep 17 00:00:00 2001 From: Richard Purdie Date: Tue, 11 May 2021 12:42:21 +0100 Subject: unzip: Exclude CVE-2008-0888 from cve-check The patch mentioned as the fix for the CVE is applied to the 6.0 source code. Zip versioning makes CPE entry changes hard. (From OE-Core rev: 8917e5ae2bb44d017fc0155f16632c5decadb0bd) Signed-off-by: Richard Purdie --- meta/recipes-extended/unzip/unzip_6.0.bb | 3 +++ 1 file changed, 3 insertions(+) (limited to 'meta/recipes-extended/unzip') diff --git a/meta/recipes-extended/unzip/unzip_6.0.bb b/meta/recipes-extended/unzip/unzip_6.0.bb index ec69508eea..40f0346f8d 100644 --- a/meta/recipes-extended/unzip/unzip_6.0.bb +++ b/meta/recipes-extended/unzip/unzip_6.0.bb @@ -33,6 +33,9 @@ UPSTREAM_VERSION_UNKNOWN = "1" SRC_URI[md5sum] = "62b490407489521db863b523a7f86375" SRC_URI[sha256sum] = "036d96991646d0449ed0aa952e4fbe21b476ce994abc276e49d30e686708bd37" +# Patch from https://bugzilla.redhat.com/attachment.cgi?id=293893&action=diff applied to 6.0 source +CVE_CHECK_WHITELIST += "CVE-2008-0888" + # exclude version 5.5.2 which triggers a false positive UPSTREAM_CHECK_REGEX = "unzip(?P(?!552).+)\.tgz" -- cgit v1.2.3-54-g00ecf