]> code.ossystems Code Review - openembedded-core.git/commitdiff
python/python3: Whitelist CVE-2019-18348
authorAdrian Bunk <bunk@stusta.de>
Thu, 5 Dec 2019 19:28:14 +0000 (21:28 +0200)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Tue, 31 Dec 2019 10:36:31 +0000 (10:36 +0000)
This is not exploitable when glibc has CVE-2016-10739 fixed,
which is fixed in the upstream version since warrior.

Signed-off-by: Adrian Bunk <bunk@stusta.de>
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
meta/recipes-devtools/python/python.inc
meta/recipes-devtools/python/python3_3.7.5.bb

index 110ec315d981152146be047067fac033123a3ae8..19a2f3e743e22feb502468dc3f0a907531b45120 100644 (file)
@@ -29,6 +29,9 @@ CVE_CHECK_WHITELIST += "CVE-2017-18207"
 # of Python that cannot really be altered at this point."
 CVE_CHECK_WHITELIST += "CVE-2015-5652"
 
+# This is not exploitable when glibc has CVE-2016-10739 fixed.
+CVE_CHECK_WHITELIST += "CVE-2019-18348"
+
 PYTHON_MAJMIN = "2.7"
 
 inherit autotools pkgconfig
index 137b540dbae55559b582a1441e856b4f26565a76..f6a1fc76e3c0fa573cb592d47b84c05a9266d023 100644 (file)
@@ -46,6 +46,9 @@ UPSTREAM_CHECK_REGEX = "[Pp]ython-(?P<pver>\d+(\.\d+)+).tar"
 
 CVE_PRODUCT = "python"
 
+# This is not exploitable when glibc has CVE-2016-10739 fixed.
+CVE_CHECK_WHITELIST += "CVE-2019-18348"
+
 PYTHON_MAJMIN = "3.7"
 PYTHON_BINABI = "${PYTHON_MAJMIN}m"