From 809b3e9113a176aedb014ba97d017f63e71dd5d9 Mon Sep 17 00:00:00 2001 From: Peter Marko Date: Thu, 6 Nov 2025 21:20:24 +0100 Subject: [PATCH] curl: ignore CVE-2025-10966 Per [1] this CVE applies only when wolfssl backed is used. 8.17.0 removed WolfSSL support completely. [1] https://curl.se/docs/CVE-2025-10966.html (From OE-Core rev: 41c4735658e9ba5322bd06ef50aa3a1edb1f7fd8) Signed-off-by: Peter Marko Signed-off-by: Steve Sakoman --- meta/recipes-support/curl/curl_7.82.0.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-support/curl/curl_7.82.0.bb b/meta/recipes-support/curl/curl_7.82.0.bb index 54362e6978..2326392a4f 100644 --- a/meta/recipes-support/curl/curl_7.82.0.bb +++ b/meta/recipes-support/curl/curl_7.82.0.bb @@ -79,6 +79,8 @@ CVE_CHECK_IGNORE += "CVE-2023-42915" CVE_CHECK_IGNORE += "CVE-2024-32928" # ignored: gzip decompression of content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option, using zlib 1.2.0.3 or older CVE_CHECK_IGNORE += "CVE-2025-0725" +# not-applicable-config: applicable only with wolfssl +CVE_CHECK_IGNORE += "${@bb.utils.contains('PACKAGECONFIG', 'openssl', 'CVE-2025-10966','',d)}" inherit autotools pkgconfig binconfig multilib_header