From: Ross Burton <ross.bur...@arm.com>

This CVE now has a version range, indicating that this Ghostscript
release isn't vulnerable.

Signed-off-by: Ross Burton <ross.bur...@arm.com>
---
 meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb 
b/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb
index f03ebf44789..0d41242bc2c 100644
--- a/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb
+++ b/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb
@@ -18,9 +18,6 @@ DEPENDS = "tiff jpeg fontconfig cups libpng freetype zlib"
 UPSTREAM_CHECK_URI = 
"https://github.com/ArtifexSoftware/ghostpdl-downloads/releases";
 UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)\.tar"
 
-# We use a system libjpeg-turbo which has this fix
-CVE_CHECK_IGNORE += "CVE-2013-6629"
-
 def gs_verdir(v):
     return "".join(v.split("."))
 
-- 
2.34.1

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#183326): 
https://lists.openembedded.org/g/openembedded-core/message/183326
Mute This Topic: https://lists.openembedded.org/mt/99717253/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to