[prev in list] [next in list] [prev in thread] [next in thread] 

List:       openembedded-core
Subject:    [OE-core] [PATCH] ncurses: Comment out version parsing that broke CVE checking
From:       Adrian Bunk <bunk () stusta ! de>
Date:       2020-02-29 9:51:04
Message-ID: 20200229095104.31724-1-bunk () stusta ! de
[Download RAW message or body]

This will be needed again when using patchlevel versions again.
Also make it more generic.

Signed-off-by: Adrian Bunk <bunk@stusta.de>
---
 meta/recipes-core/ncurses/ncurses_6.2.bb | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/meta/recipes-core/ncurses/ncurses_6.2.bb b/meta/recipes-core/ncurses/ncurses_6.2.bb
index b6d899c878..723e685a9b 100644
--- a/meta/recipes-core/ncurses/ncurses_6.2.bb
+++ b/meta/recipes-core/ncurses/ncurses_6.2.bb
@@ -10,4 +10,5 @@ S = "${WORKDIR}/git"
 EXTRA_OECONF += "--with-abi-version=5 --cache-file=${B}/config.cache"
 UPSTREAM_CHECK_GITTAGREGEX = "(?P<pver>\d+(\.\d+)+(\+\d+)*)"
 
-CVE_VERSION = "6.1.${@d.getVar("PV").split('+')[1]}"
+# This is needed when using patchlevel versions like 6.1+20181013
+#CVE_VERSION = "${@d.getVar("PV").split('+')[0]}.${@d.getVar("PV").split('+')[1]}"
-- 
2.17.1

-- 
_______________________________________________
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic