]> code.ossystems Code Review - openembedded-core.git/commitdiff
cve-check: remove redundant readline CVE whitelisting
authorRoss Burton <ross.burton@intel.com>
Tue, 16 Jul 2019 12:46:43 +0000 (13:46 +0100)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Wed, 17 Jul 2019 08:36:29 +0000 (09:36 +0100)
CVE-2014-2524 is a readline CVE that was fixed in 6.3patch3 onwards, but the
tooling wasn't able to detect this version.  As we now ship readline 8 we don't
need to manually whitelist it, and if we did then the whitelisting should be in
the readline recipe.

Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/classes/cve-check.bbclass

index ffd624333f6e4b825c13fd8ed67c87f5ce290641..5979edf3d178968b246d1b0e0aec9e65d3ce91d5 100644 (file)
@@ -41,10 +41,15 @@ CVE_CHECK_PN_WHITELIST = "\
     glibc-locale \
 "
 
-# Whitelist for CVE and version of package
-CVE_CHECK_CVE_WHITELIST = "{\
-    'CVE-2014-2524': ('6.3','5.2',), \
-}"
+# Whitelist for CVE and version of package. If a CVE is found then the PV is
+# compared with the version list, and if found the CVE is considered
+# patched.
+#
+# The value should be valid Python in this format:
+# {
+#   'CVE-2014-2524': ('6.3','5.2')
+# }
+CVE_CHECK_CVE_WHITELIST ?= "{}"
 
 python do_cve_check () {
     """