Message ID | 7c4b4daeeca8fab257475eacb83c58b7e5dfee24.1700620126.git.steve@sakoman.com |
---|---|
State | New, archived |
Delegated to: | Steve Sakoman |
Headers | show |
Series | [kirkstone,01/16] tiff: Backport fix for CVE-2023-41175 | expand |
diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb index 4c4c22cf39..7f4050755c 100644 --- a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb +++ b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb @@ -23,6 +23,9 @@ UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)\.tar" # however we use an external jpeg which doesn't have the issue. CVE_CHECK_IGNORE += "CVE-2013-6629" +# Issue in the GhostPCL. GhostPCL not part of this GhostScript recipe. +CVE_CHECK_IGNORE += "CVE-2023-38560" + def gs_verdir(v): return "".join(v.split("."))