diff options
author | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-05-10 16:30:56 +0100 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-05-22 10:00:45 +0100 |
commit | 6f422e966fdc1e62ff0e48d3382ec246ff8bd998 (patch) | |
tree | f2f717a2d9cc9e28cea35ad412d350c5fa70e2ac /meta | |
parent | 7c7c3f3dd3bf7dc34f26d931acf562e93c45e807 (diff) | |
download | openembedded-core-contrib-6f422e966fdc1e62ff0e48d3382ec246ff8bd998.tar.gz |
jquery: Exclude CVE-2007-2379 from cve-check
The CVE is non-specific and depends on the users of jquery, doesn't
make sense to have this flagged against jquery as there is nothing we can
do about it.
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r-- | meta/recipes-devtools/jquery/jquery_3.6.0.bb | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/meta/recipes-devtools/jquery/jquery_3.6.0.bb b/meta/recipes-devtools/jquery/jquery_3.6.0.bb index 65905966c1..03792730fd 100644 --- a/meta/recipes-devtools/jquery/jquery_3.6.0.bb +++ b/meta/recipes-devtools/jquery/jquery_3.6.0.bb @@ -19,6 +19,11 @@ SRC_URI[map.sha256sum] = "399548fb0e7b146c12f5ba18099a47d594a970fee96212eee0ab48 UPSTREAM_CHECK_REGEX = "jquery-(?P<pver>\d+(\.\d+)+)\.js" +# https://github.com/jquery/jquery/issues/3927 +# There are ways jquery can expose security issues but any issues are in the apps exposing them +# and there is little we can directly do +CVE_CHECK_WHITELIST += "CVE-2007-2379" + inherit allarch do_install() { |