From: Ross Burton <ross.bur...@arm.com> This CVE now has a version range, indicating that this Ghostscript release isn't vulnerable.
Signed-off-by: Ross Burton <ross.bur...@arm.com> --- meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb | 3 --- 1 file changed, 3 deletions(-) diff --git a/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb b/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb index f03ebf44789..0d41242bc2c 100644 --- a/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb +++ b/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb @@ -18,9 +18,6 @@ DEPENDS = "tiff jpeg fontconfig cups libpng freetype zlib" UPSTREAM_CHECK_URI = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases" UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)\.tar" -# We use a system libjpeg-turbo which has this fix -CVE_CHECK_IGNORE += "CVE-2013-6629" - def gs_verdir(v): return "".join(v.split(".")) -- 2.34.1
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#183326): https://lists.openembedded.org/g/openembedded-core/message/183326 Mute This Topic: https://lists.openembedded.org/mt/99717253/21656 Group Owner: openembedded-core+ow...@lists.openembedded.org Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-