]> code.ossystems Code Review - openembedded-core.git/commitdiff
python/python3: Whitelist CVE-2019-18348
authorAdrian Bunk <bunk@stusta.de>
Wed, 1 Jan 2020 18:50:59 +0000 (20:50 +0200)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Fri, 3 Jan 2020 22:35:19 +0000 (22:35 +0000)
This is not exploitable when glibc has CVE-2016-10739 fixed,
which is fixed in the upstream version since warrior.

Signed-off-by: Adrian Bunk <bunk@stusta.de>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-devtools/python/python.inc
meta/recipes-devtools/python/python3_3.7.6.bb

index 110ec315d981152146be047067fac033123a3ae8..19a2f3e743e22feb502468dc3f0a907531b45120 100644 (file)
@@ -29,6 +29,9 @@ CVE_CHECK_WHITELIST += "CVE-2017-18207"
 # of Python that cannot really be altered at this point."
 CVE_CHECK_WHITELIST += "CVE-2015-5652"
 
+# This is not exploitable when glibc has CVE-2016-10739 fixed.
+CVE_CHECK_WHITELIST += "CVE-2019-18348"
+
 PYTHON_MAJMIN = "2.7"
 
 inherit autotools pkgconfig
index af201d7f8f82a26edb978ed05b83c43e9bb38c32..8a03260f3f9e9d56e3d1a0801eb974b7c31b9e37 100644 (file)
@@ -47,6 +47,9 @@ UPSTREAM_CHECK_REGEX = "[Pp]ython-(?P<pver>\d+(\.\d+)+).tar"
 
 CVE_PRODUCT = "python"
 
+# This is not exploitable when glibc has CVE-2016-10739 fixed.
+CVE_CHECK_WHITELIST += "CVE-2019-18348"
+
 PYTHON_MAJMIN = "3.7"
 PYTHON_BINABI = "${PYTHON_MAJMIN}m"