From patchwork Fri Oct 15 21:50:03 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Paul Cercueil X-Patchwork-Id: 1541943 Return-Path: X-Original-To: incoming-buildroot@patchwork.ozlabs.org Delivered-To: patchwork-incoming-buildroot@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org (client-ip=140.211.166.137; helo=smtp4.osuosl.org; envelope-from=buildroot-bounces@buildroot.org; receiver=) Received: from smtp4.osuosl.org (smtp4.osuosl.org [140.211.166.137]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4HWKgv4lc0z9sPf for ; Sat, 16 Oct 2021 08:50:19 +1100 (AEDT) Received: from localhost (localhost [127.0.0.1]) by smtp4.osuosl.org (Postfix) with ESMTP id 4A3554046F; Fri, 15 Oct 2021 21:50:17 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp4.osuosl.org ([127.0.0.1]) by localhost (smtp4.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4pVAUd2yCcC8; Fri, 15 Oct 2021 21:50:16 +0000 (UTC) Received: from ash.osuosl.org (ash.osuosl.org [140.211.166.34]) by smtp4.osuosl.org (Postfix) with ESMTP id AECC5403F6; Fri, 15 Oct 2021 21:50:15 +0000 (UTC) X-Original-To: buildroot@lists.busybox.net Delivered-To: buildroot@osuosl.org Received: from smtp3.osuosl.org (smtp3.osuosl.org [140.211.166.136]) by ash.osuosl.org (Postfix) with ESMTP id 87EAD1BF417 for ; Fri, 15 Oct 2021 21:50:14 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id 77B0C60EF1 for ; Fri, 15 Oct 2021 21:50:14 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n1LK1HYjQLxV for ; Fri, 15 Oct 2021 21:50:13 +0000 (UTC) X-Greylist: from auto-whitelisted by SQLgrey-1.8.0 Received: from aposti.net (aposti.net [89.234.176.197]) by smtp3.osuosl.org (Postfix) with ESMTPS id 7BAC360876 for ; Fri, 15 Oct 2021 21:50:13 +0000 (UTC) From: Paul Cercueil To: buildroot@buildroot.org Date: Fri, 15 Oct 2021 22:50:03 +0100 Message-Id: <20211015215003.181073-1-paul@crapouillou.net> MIME-Version: 1.0 Subject: [Buildroot] [PATCH] package/lightning: stop spam! X-BeenThere: buildroot@buildroot.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussion and development of buildroot List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Paul Cercueil Errors-To: buildroot-bounces@buildroot.org Sender: "buildroot" Every week I receive an automated email that tells me about the CVE-2020-7747 vulnerability in Lightning. This vulnerability however applies to the Javascript lightning-server project, and not to the GNU Lightning project. Ignore this CVE in the Lightning package to reduce my stress levels. Signed-off-by: Paul Cercueil --- package/lightning/lightning.mk | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/package/lightning/lightning.mk b/package/lightning/lightning.mk index 3bd17bef56..38b132e082 100644 --- a/package/lightning/lightning.mk +++ b/package/lightning/lightning.mk @@ -12,6 +12,10 @@ LIGHTNING_INSTALL_STAGING = YES # We're patching include/Makefile.am LIGHTNING_AUTORECONF = YES +# CVE-2020-7747 is for the Javascript lightning-server project, and not for +# GNU Lightning. +LIGHTNING_IGNORE_CVES = CVE-2020-7747 + ifeq ($(BR2_PACKAGE_LIGHTNING_DISASSEMBLER),y) LIGHTNING_DEPENDENCIES += binutils zlib LIGHTNING_CONF_OPTS += --enable-disassembler