From: virendra thakur Date: Tue, 6 Feb 2024 10:01:58 +0000 (+0530) Subject: perl: Whitelist CVE-2023-47039 X-Git-Tag: yocto-3.1.32~17 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=970a0a64ce147970c7743411584c9bd1dc1ce414;p=thirdparty%2Fopenembedded%2Fopenembedded-core.git perl: Whitelist CVE-2023-47039 This CVE is related to Windows. Link: https://nvd.nist.gov/vuln/detail/CVE-2023-47039 Signed-off-by: virendra thakur Signed-off-by: Steve Sakoman --- diff --git a/meta/recipes-devtools/perl/perl_5.30.1.bb b/meta/recipes-devtools/perl/perl_5.30.1.bb index 4b5a4a5619b..bf81a023b86 100644 --- a/meta/recipes-devtools/perl/perl_5.30.1.bb +++ b/meta/recipes-devtools/perl/perl_5.30.1.bb @@ -46,6 +46,10 @@ SRC_URI[perl-cross.sha256sum] = "edce0b0c2f725e2db3f203d6d8e9f3f7161256f5d159055 S = "${WORKDIR}/perl-${PV}" +# This is windows only issue. +# https://ubuntu.com/security/CVE-2023-47039 +CVE_CHECK_WHITELIST += "CVE-2023-47039" + inherit upstream-version-is-even update-alternatives DEPENDS += "zlib virtual/crypt"