From: Peter Marko Date: Tue, 13 Feb 2024 07:38:09 +0000 (+0530) Subject: gcc-shared-source: whitelist CVE-2023-4039 X-Git-Tag: yocto-3.1.32~11 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=037f640b9272ba055ee41eeb1e6e9b002faefe36;p=thirdparty%2Fopenembedded%2Fopenembedded-core.git gcc-shared-source: whitelist CVE-2023-4039 Concept of gcc-source prevents cve-check to detect existing CVE patch file. So whitelist this CVE in all recipes using gcc-source via this include file. (From OE-Core rev: 04511734c6dc8c7dda3a943b385cd273d012d8c7) Signed-off-by: Peter Marko Signed-off-by: Steve Sakoman (cherry picked from commit d803ca653139aa2d6acb4f99469c76a9d232b307) Signed-off-by: Dnyandev Padalkar Signed-off-by: Steve Sakoman --- diff --git a/meta/recipes-devtools/gcc/gcc-shared-source.inc b/meta/recipes-devtools/gcc/gcc-shared-source.inc index aac4b49313c..4baf7874d24 100644 --- a/meta/recipes-devtools/gcc/gcc-shared-source.inc +++ b/meta/recipes-devtools/gcc/gcc-shared-source.inc @@ -9,3 +9,6 @@ SRC_URI = "" do_configure[depends] += "gcc-source-${PV}:do_preconfigure" do_populate_lic[depends] += "gcc-source-${PV}:do_unpack" + +# patch is available via gcc-source recipe +CVE_CHECK_WHITELIST += "CVE-2023-4039"