| Message ID | e1f3d02e80f6bdd942321d9f6718dcc36afe9df8.1745981510.git.steve@sakoman.com |
|---|---|
| State | Accepted, archived |
| Commit | e1f3d02e80f6bdd942321d9f6718dcc36afe9df8 |
| Delegated to: | Steve Sakoman |
| Headers | show |
| Series | [kirkstone,01/14] sqlite3: patch CVE-2025-29088 | expand |
diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb index 8499bb3676..3d4ac77cfa 100644 --- a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb +++ b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb @@ -22,9 +22,10 @@ UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)\.tar" # As of ghostscript 9.54.0 the jpeg issue in the CVE is present in the gs jpeg sources # however we use an external jpeg which doesn't have the issue. CVE_CHECK_IGNORE += "CVE-2013-6629" - # Issue in the GhostPCL. GhostPCL not part of this GhostScript recipe. CVE_CHECK_IGNORE += "CVE-2023-38560 CVE-2024-46954" +# Vulnerable code was introduced in 9.56.0, so 9.55.0 is not affected yet +CVE_CHECK_IGNORE += "CVE-2025-27833" def gs_verdir(v): return "".join(v.split("."))