From da6d0763a7fb9c7a322bf5964f8abdf6bed7e219 Mon Sep 17 00:00:00 2001 From: Ross Burton Date: Fri, 23 Jun 2023 13:32:48 +0100 Subject: [PATCH] ghostscript: remove CVE_CHECK_IGNORE for CVE-2013-6629 This CVE now has a version range, indicating that this Ghostscript release isn't vulnerable. Signed-off-by: Ross Burton Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie --- meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb | 3 --- 1 file changed, 3 deletions(-) diff --git a/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb b/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb index f03ebf44789..0d41242bc2c 100644 --- a/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb +++ b/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb @@ -18,9 +18,6 @@ DEPENDS = "tiff jpeg fontconfig cups libpng freetype zlib" UPSTREAM_CHECK_URI = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases" UPSTREAM_CHECK_REGEX = "(?P\d+(\.\d+)+)\.tar" -# We use a system libjpeg-turbo which has this fix -CVE_CHECK_IGNORE += "CVE-2013-6629" - def gs_verdir(v): return "".join(v.split(".")) -- 2.47.3