From: Peter Marko Date: Thu, 6 Nov 2025 20:20:24 +0000 (+0100) Subject: curl: ignore CVE-2025-10966 X-Git-Tag: 2022-04.32-kirkstone~40 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=41c4735658e9ba5322bd06ef50aa3a1edb1f7fd8;p=thirdparty%2Fopenembedded%2Fopenembedded-core.git curl: ignore CVE-2025-10966 Per [1] this CVE applies only when wolfssl backed is used. 8.17.0 removed WolfSSL support completely. [1] https://curl.se/docs/CVE-2025-10966.html Signed-off-by: Peter Marko Signed-off-by: Steve Sakoman --- diff --git a/meta/recipes-support/curl/curl_7.82.0.bb b/meta/recipes-support/curl/curl_7.82.0.bb index 54362e6978..2326392a4f 100644 --- a/meta/recipes-support/curl/curl_7.82.0.bb +++ b/meta/recipes-support/curl/curl_7.82.0.bb @@ -79,6 +79,8 @@ CVE_CHECK_IGNORE += "CVE-2023-42915" CVE_CHECK_IGNORE += "CVE-2024-32928" # ignored: gzip decompression of content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option, using zlib 1.2.0.3 or older CVE_CHECK_IGNORE += "CVE-2025-0725" +# not-applicable-config: applicable only with wolfssl +CVE_CHECK_IGNORE += "${@bb.utils.contains('PACKAGECONFIG', 'openssl', 'CVE-2025-10966','',d)}" inherit autotools pkgconfig binconfig multilib_header