summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRichard Purdie <richard.purdie@linuxfoundation.org>2021-05-11 12:42:21 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2021-05-22 10:01:03 +0100
commite6c8fcc1c022d4d36a971531f1a5f42fce7cd516 (patch)
tree49258db31aed88651fb4ddcd29c3d9fd96d5c092
parent03b6c50c3da659790c656802fe3c4882113966ac (diff)
downloadpoky-e6c8fcc1c022d4d36a971531f1a5f42fce7cd516.tar.gz
poky-e6c8fcc1c022d4d36a971531f1a5f42fce7cd516.tar.bz2
poky-e6c8fcc1c022d4d36a971531f1a5f42fce7cd516.zip
unzip: Exclude CVE-2008-0888 from cve-check
The patch mentioned as the fix for the CVE is applied to the 6.0 source code. Zip versioning makes CPE entry changes hard. (From OE-Core rev: f816be9387d4691dbacd17673749809fe125d35c) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r--meta/recipes-extended/unzip/unzip_6.0.bb3
1 files changed, 3 insertions, 0 deletions
diff --git a/meta/recipes-extended/unzip/unzip_6.0.bb b/meta/recipes-extended/unzip/unzip_6.0.bb
index 0c56a39d92..af5530ab38 100644
--- a/meta/recipes-extended/unzip/unzip_6.0.bb
+++ b/meta/recipes-extended/unzip/unzip_6.0.bb
@@ -32,6 +32,9 @@ UPSTREAM_VERSION_UNKNOWN = "1"
SRC_URI[md5sum] = "62b490407489521db863b523a7f86375"
SRC_URI[sha256sum] = "036d96991646d0449ed0aa952e4fbe21b476ce994abc276e49d30e686708bd37"
+# Patch from https://bugzilla.redhat.com/attachment.cgi?id=293893&action=diff applied to 6.0 source
+CVE_CHECK_WHITELIST += "CVE-2008-0888"
+
# exclude version 5.5.2 which triggers a false positive
UPSTREAM_CHECK_REGEX = "unzip(?P<pver>(?!552).+)\.tgz"