diff mbox series

[2/4] ghostscript: remove CVE_CHECK_IGNORE for CVE-2013-6629

Message ID 20230623123250.726731-2-ross.burton@arm.com
State Accepted, archived
Commit da6d0763a7fb9c7a322bf5964f8abdf6bed7e219
Headers show
Series [1/4] cve-update-db-native: remove | expand

Commit Message

Ross Burton June 23, 2023, 12:32 p.m. UTC
From: Ross Burton <ross.burton@arm.com>

This CVE now has a version range, indicating that this Ghostscript
release isn't vulnerable.

Signed-off-by: Ross Burton <ross.burton@arm.com>
---
 meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb | 3 ---
 1 file changed, 3 deletions(-)
diff mbox series

Patch

diff --git a/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb b/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb
index f03ebf44789..0d41242bc2c 100644
--- a/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb
+++ b/meta/recipes-extended/ghostscript/ghostscript_10.01.1.bb
@@ -18,9 +18,6 @@  DEPENDS = "tiff jpeg fontconfig cups libpng freetype zlib"
 UPSTREAM_CHECK_URI = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases"
 UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)\.tar"
 
-# We use a system libjpeg-turbo which has this fix
-CVE_CHECK_IGNORE += "CVE-2013-6629"
-
 def gs_verdir(v):
     return "".join(v.split("."))