]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/commit
cve-check.bbclass: CVE-2014-2524 / readline v5.2
authorAndré Draszik <adraszik@tycoint.com>
Fri, 4 Nov 2016 11:06:31 +0000 (11:06 +0000)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Wed, 11 Jan 2017 17:21:41 +0000 (17:21 +0000)
commit53ad465b40a772c55e949448a33a06e5e781e7d4
tree7697571c04ed2b0f66234ad92dd373f3b5f3f820
parent2336faa9aa896c991f5de12b2f62d4bffe7d30d3
cve-check.bbclass: CVE-2014-2524 / readline v5.2

Contrary to the CVE report, the vulnerable trace functions
don't exist in readline v5.2 (which we keep for GPLv2+
purposes), they were added in readline v6.0 only - let's
whitelist that CVE in order to avoid false positives.

See also the discussion in
 https://patchwork.openembedded.org/patch/81765/

(From OE-Core rev: b881a288eec598002685f68da80a24e0478fa496)

(From OE-Core rev: b4498a6b734661fdfe3ff4e0a9850e796b72005c)

Signed-off-by: André Draszik <adraszik@tycoint.com>
Reviewed-by: Lukasz Nowak <lnowak@tycoint.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/classes/cve-check.bbclass