From: Robert Joslyn Date: Sun, 5 Jun 2022 21:47:34 +0000 (-0700) Subject: curl: Fix CVE_CHECK_WHITELIST typo X-Git-Tag: 2020-04.18-dunfell~57 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=7b2a1d908d3b63da5e9f072b61dd3c5fa91c7b8f;p=thirdparty%2Fopenembedded%2Fopenembedded-core.git curl: Fix CVE_CHECK_WHITELIST typo Fix typo to properly whitelist CVE-2021-22945. Signed-off-by: Robert Joslyn Signed-off-by: Steve Sakoman --- diff --git a/meta/recipes-support/curl/curl_7.69.1.bb b/meta/recipes-support/curl/curl_7.69.1.bb index b53b00cc382..5a597a7dd9e 100644 --- a/meta/recipes-support/curl/curl_7.69.1.bb +++ b/meta/recipes-support/curl/curl_7.69.1.bb @@ -42,7 +42,7 @@ SRC_URI[sha256sum] = "2ff5e5bd507adf6aa88ff4bbafd4c7af464867ffb688be93b9930717a5 # Curl has used many names over the years... CVE_PRODUCT = "haxx:curl haxx:libcurl curl:curl curl:libcurl libcurl:libcurl daniel_stenberg:curl" -CVE_CHECK_WHITELIST = "CVE-2021-22922 CVE-2021-22923 CVE-2021-22926 CVE-22945" +CVE_CHECK_WHITELIST = "CVE-2021-22922 CVE-2021-22923 CVE-2021-22926 CVE-2021-22945" # As per link https://security-tracker.debian.org/tracker/CVE-2021-22897 # and https://ubuntu.com/security/CVE-2021-22897