Details: https://nvd.nist.gov/vuln/detail/CVE-2022-0543

The issue is specific to the version packaged by Debian, it can be ignored.

Signed-off-by: Gyorgy Sarvari <[email protected]>
---
 meta-oe/recipes-extended/redis/redis_6.2.21.bb | 2 ++
 meta-oe/recipes-extended/redis/redis_7.2.12.bb | 1 +
 2 files changed, 3 insertions(+)

diff --git a/meta-oe/recipes-extended/redis/redis_6.2.21.bb 
b/meta-oe/recipes-extended/redis/redis_6.2.21.bb
index e0bf92b210..efa8677e76 100644
--- a/meta-oe/recipes-extended/redis/redis_6.2.21.bb
+++ b/meta-oe/recipes-extended/redis/redis_6.2.21.bb
@@ -65,3 +65,5 @@ INITSCRIPT_NAME = "redis-server"
 INITSCRIPT_PARAMS = "defaults 87"
 
 SYSTEMD_SERVICE:${PN} = "redis.service"
+
+CVE_STATUS[CVE-2022-0543] = "not-applicable-config: the vulnerability is not 
present in upstream, only in Debian-packaged versions"
diff --git a/meta-oe/recipes-extended/redis/redis_7.2.12.bb 
b/meta-oe/recipes-extended/redis/redis_7.2.12.bb
index bc60f75b01..cd2be6f27e 100644
--- a/meta-oe/recipes-extended/redis/redis_7.2.12.bb
+++ b/meta-oe/recipes-extended/redis/redis_7.2.12.bb
@@ -70,3 +70,4 @@ INITSCRIPT_PARAMS = "defaults 87"
 SYSTEMD_SERVICE:${PN} = "redis.service"
 
 CVE_STATUS[CVE-2022-3734] = "not-applicable-platform: CVE only applies for 
Windows."
+CVE_STATUS[CVE-2022-0543] = "not-applicable-config: the vulnerability is not 
present in upstream, only in Debian-packaged versions"
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#122185): 
https://lists.openembedded.org/g/openembedded-devel/message/122185
Mute This Topic: https://lists.openembedded.org/mt/116544457/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to