From: Richard Purdie Date: Sat, 28 May 2022 10:15:29 +0000 (+0100) Subject: libxslt: Mark CVE-2022-29824 as not applying X-Git-Tag: lucaceresoli/bug-15201-perf-libtraceevent-missing~3998 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=c6315d8a2a1429a0fb7563b1d6352ceee7bc222c;p=thirdparty%2Fopenembedded%2Fopenembedded-core-contrib.git libxslt: Mark CVE-2022-29824 as not applying We have libxml2 2.9.14 and we don't link statically against libxml2 anyway so the CVE doesn't apply to libxslt. Signed-off-by: Richard Purdie --- diff --git a/meta/recipes-support/libxslt/libxslt_1.1.35.bb b/meta/recipes-support/libxslt/libxslt_1.1.35.bb index 51cfb2e2811..2fd777766cc 100644 --- a/meta/recipes-support/libxslt/libxslt_1.1.35.bb +++ b/meta/recipes-support/libxslt/libxslt_1.1.35.bb @@ -19,6 +19,10 @@ SRC_URI[sha256sum] = "8247f33e9a872c6ac859aa45018bc4c4d00b97e2feac9eebc10c93ce1f UPSTREAM_CHECK_REGEX = "libxslt-(?P\d+(\.\d+)+)\.tar" +# We have libxml2 2.9.14 and we don't link statically with it anyway +# so this isn't an issue. +CVE_CHECK_IGNORE += "CVE-2022-29824" + S = "${WORKDIR}/libxslt-${PV}" BINCONFIG = "${bindir}/xslt-config"