[oe-commits] [openembedded-core] 29/50: cve-check.bbclass: CVE-2014-2524 / readline v5.2

git at git.openembedded.org git at git.openembedded.org
Tue Nov 15 15:21:01 UTC 2016


rpurdie pushed a commit to branch master
in repository openembedded-core.

commit b881a288eec598002685f68da80a24e0478fa496
Author: André Draszik <adraszik at tycoint.com>
AuthorDate: Fri Nov 4 11:06:31 2016 +0000

    cve-check.bbclass: CVE-2014-2524 / readline v5.2
    
    Contrary to the CVE report, the vulnerable trace functions
    don't exist in readline v5.2 (which we keep for GPLv2+
    purposes), they were added in readline v6.0 only - let's
    whitelist that CVE in order to avoid false positives.
    
    See also the discussion in
     https://patchwork.openembedded.org/patch/81765/
    
    Signed-off-by: André Draszik <adraszik at tycoint.com>
    Reviewed-by: Lukasz Nowak <lnowak at tycoint.com>
    Signed-off-by: Ross Burton <ross.burton at intel.com>
---
 meta/classes/cve-check.bbclass | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass
index 1425a40..b0febfb 100644
--- a/meta/classes/cve-check.bbclass
+++ b/meta/classes/cve-check.bbclass
@@ -39,7 +39,7 @@ CVE_CHECK_PN_WHITELIST = "\
 
 # Whitelist for CVE and version of package
 CVE_CHECK_CVE_WHITELIST = "{\
-    'CVE-2014-2524': ('6.3',), \
+    'CVE-2014-2524': ('6.3','5.2',), \
 }"
 
 python do_cve_check () {

-- 
To stop receiving notification emails like this one, please contact
the administrator of this repository.


More information about the Openembedded-commits mailing list