From: Peter Marko Date: Fri, 6 Dec 2024 18:25:13 +0000 (+0100) Subject: tiff: set status for CVEs firx in 4.7.0 X-Git-Tag: uninative-4.7~641 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=56cbd53cffc39ff5067f6ed1412af36005a82fcc;p=thirdparty%2Fopenembedded%2Fopenembedded-core.git tiff: set status for CVEs firx in 4.7.0 NDV DB tracks these CVEs as version-less. So these re-appered in CVE reports after patch files were removed during last upgrade although the CVEs are fixed. This seems to be a current trend with RedHat CVEs since due due to current NVD CVE annotation situation, version-less CVEs are no longer getting fixed-in added version when available. Signed-off-by: Peter Marko Signed-off-by: Richard Purdie --- diff --git a/meta/recipes-multimedia/libtiff/tiff_4.7.0.bb b/meta/recipes-multimedia/libtiff/tiff_4.7.0.bb index 5b318d06219..5a6939d584f 100644 --- a/meta/recipes-multimedia/libtiff/tiff_4.7.0.bb +++ b/meta/recipes-multimedia/libtiff/tiff_4.7.0.bb @@ -16,6 +16,9 @@ SRC_URI[sha256sum] = "67160e3457365ab96c5b3286a0903aa6e78bdc44c4bc737d2e486bcecb UPSTREAM_CHECK_REGEX = "tiff-(?P\d+(\.\d+)+).tar" CVE_STATUS[CVE-2015-7313] = "fixed-version: Tested with check from https://security-tracker.debian.org/tracker/CVE-2015-7313 and already 4.3.0 doesn't have the issue" +CVE_STATUS[CVE-2023-52356] = "fixed-version: Fixed since 4.7.0, NVD tracks this as version-less vulnerability" +CVE_STATUS[CVE-2023-6228] = "fixed-version: Fixed since 4.7.0, NVD tracks this as version-less vulnerability" +CVE_STATUS[CVE-2023-6277] = "fixed-version: Fixed since 4.7.0, NVD tracks this as version-less vulnerability" inherit autotools multilib_header