From f816be9387d4691dbacd17673749809fe125d35c Mon Sep 17 00:00:00 2001 From: Richard Purdie Date: Tue, 11 May 2021 12:42:21 +0100 Subject: unzip: Exclude CVE-2008-0888 from cve-check The patch mentioned as the fix for the CVE is applied to the 6.0 source code. Zip versioning makes CPE entry changes hard. Signed-off-by: Richard Purdie --- meta/recipes-extended/unzip/unzip_6.0.bb | 3 +++ 1 file changed, 3 insertions(+) (limited to 'meta/recipes-extended') diff --git a/meta/recipes-extended/unzip/unzip_6.0.bb b/meta/recipes-extended/unzip/unzip_6.0.bb index 0c56a39d92..af5530ab38 100644 --- a/meta/recipes-extended/unzip/unzip_6.0.bb +++ b/meta/recipes-extended/unzip/unzip_6.0.bb @@ -32,6 +32,9 @@ UPSTREAM_VERSION_UNKNOWN = "1" SRC_URI[md5sum] = "62b490407489521db863b523a7f86375" SRC_URI[sha256sum] = "036d96991646d0449ed0aa952e4fbe21b476ce994abc276e49d30e686708bd37" +# Patch from https://bugzilla.redhat.com/attachment.cgi?id=293893&action=diff applied to 6.0 source +CVE_CHECK_WHITELIST += "CVE-2008-0888" + # exclude version 5.5.2 which triggers a false positive UPSTREAM_CHECK_REGEX = "unzip(?P(?!552).+)\.tgz" -- cgit 1.2.3-korg