Details: https://nvd.nist.gov/vuln/detail/CVE-2023-3297

The vulnerability is triggered by a patch added by Ubuntu, and the vulnerable 
patch is
not present in the recipe.

Signed-off-by: Gyorgy Sarvari <[email protected]>
Signed-off-by: Khem Raj <[email protected]>
(cherry picked from commit 071a45c9d76c9a222c8fbaa50089a8af44f44e74)

Adapted to Kirkstone
Signed-off-by: Gyorgy Sarvari <[email protected]>
---
 .../recipes-support/accountsservice/accountsservice_22.08.8.bb | 3 +++
 1 file changed, 3 insertions(+)

diff --git 
a/meta-gnome/recipes-support/accountsservice/accountsservice_22.08.8.bb 
b/meta-gnome/recipes-support/accountsservice/accountsservice_22.08.8.bb
index 439958c7d2..702b11d9f0 100644
--- a/meta-gnome/recipes-support/accountsservice/accountsservice_22.08.8.bb
+++ b/meta-gnome/recipes-support/accountsservice/accountsservice_22.08.8.bb
@@ -30,3 +30,6 @@ FILES:${PN} += " \
     ${datadir}/dbus-1 \
     ${datadir}/polkit-1 \
 "
+
+# not-applicable-platform: The vulnerability is Ubuntu specific
+CVE_CHECK_IGNORE += "CVE-2023-3297"
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#122707): 
https://lists.openembedded.org/g/openembedded-devel/message/122707
Mute This Topic: https://lists.openembedded.org/mt/116815246/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to