This is not exploitable when glibc has CVE-2016-10739 fixed, which is fixed in the upstream version since warrior.
Signed-off-by: Adrian Bunk <[email protected]> --- meta/recipes-devtools/python/python.inc | 3 +++ meta/recipes-devtools/python/python3_3.8.0.bb | 3 +++ 2 files changed, 6 insertions(+) diff --git a/meta/recipes-devtools/python/python.inc b/meta/recipes-devtools/python/python.inc index 110ec315d9..19a2f3e743 100644 --- a/meta/recipes-devtools/python/python.inc +++ b/meta/recipes-devtools/python/python.inc @@ -29,6 +29,9 @@ CVE_CHECK_WHITELIST += "CVE-2017-18207" # of Python that cannot really be altered at this point." CVE_CHECK_WHITELIST += "CVE-2015-5652" +# This is not exploitable when glibc has CVE-2016-10739 fixed. +CVE_CHECK_WHITELIST += "CVE-2019-18348" + PYTHON_MAJMIN = "2.7" inherit autotools pkgconfig diff --git a/meta/recipes-devtools/python/python3_3.8.0.bb b/meta/recipes-devtools/python/python3_3.8.0.bb index 1feaebea8e..92f6527c70 100644 --- a/meta/recipes-devtools/python/python3_3.8.0.bb +++ b/meta/recipes-devtools/python/python3_3.8.0.bb @@ -42,6 +42,9 @@ UPSTREAM_CHECK_REGEX = "[Pp]ython-(?P<pver>\d+(\.\d+)+).tar" CVE_PRODUCT = "python" +# This is not exploitable when glibc has CVE-2016-10739 fixed. +CVE_CHECK_WHITELIST += "CVE-2019-18348" + PYTHON_MAJMIN = "3.8" S = "${WORKDIR}/Python-${PV}" -- 2.17.1 -- _______________________________________________ Openembedded-core mailing list [email protected] http://lists.openembedded.org/mailman/listinfo/openembedded-core
