From: Peter Marko Date: Sat, 12 Jul 2025 21:19:22 +0000 (+0200) Subject: ghostscript: ignore CVE-2025-46646 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=a3e02ed74db2c234b7c3718b4d6b5332468de226;p=thirdparty%2Fopenembedded%2Fopenembedded-core-contrib.git ghostscript: ignore CVE-2025-46646 The code patched by [1] which fixes this CVE is not available in 9.55.0. Also Debian says in [2] that even 10.0.0 is not yet affected. [1] https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f14ea81e6c3d2f51593f23cdf13c4679a18f1a3f [2] https://security-tracker.debian.org/tracker/CVE-2025-46646 Signed-off-by: Peter Marko Signed-off-by: Steve Sakoman --- diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb index 3b50ac1409..4d696159e0 100644 --- a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb +++ b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb @@ -28,6 +28,8 @@ CVE_CHECK_IGNORE += "CVE-2023-38560 CVE-2024-46954" CVE_CHECK_IGNORE += "CVE-2024-29507 CVE-2025-27833" # Only impacts codepaths relevant for Windows builds CVE_CHECK_IGNORE += "CVE-2025-27837" +# Vulnerable code was introduced later, so 9.55.0 is not affected yet +CVE_CHECK_IGNORE += "CVE-2025-46646" def gs_verdir(v): return "".join(v.split("."))