Message ID | 20240825214413.2479354-1-peter.marko@siemens.com |
---|---|
State | Accepted, archived |
Commit | a28240d49c111050e253e373507ac3094b74f6e1 |
Delegated to: | Steve Sakoman |
Headers | show |
Series | [kirkstone] libyaml: Ignore CVE-2024-35325 | expand |
diff --git a/meta/recipes-support/libyaml/libyaml_0.2.5.bb b/meta/recipes-support/libyaml/libyaml_0.2.5.bb index e30dc5a43f..514c60779c 100644 --- a/meta/recipes-support/libyaml/libyaml_0.2.5.bb +++ b/meta/recipes-support/libyaml/libyaml_0.2.5.bb @@ -20,5 +20,7 @@ DISABLE_STATIC:class-native = "" # upstream-wontfix: Upstream thinks there is no working code that is exploitable - https://github.com/yaml/libyaml/issues/302 CVE_CHECK_IGNORE += "CVE-2024-35326 CVE-2024-35328" +# upstream-wontfix: Upstream thinks this is a misuse (or wrong use) of the libyaml API - https://github.com/yaml/libyaml/issues/303 +CVE_CHECK_IGNORE += "CVE-2024-35325" BBCLASSEXTEND = "native nativesdk"
This is similar CVE as the previous ones from the same author. https://github.com/yaml/libyaml/issues/303 explain why this is misuse (or wrong use) of libyaml. Signed-off-by: Peter Marko <peter.marko@siemens.com> --- meta/recipes-support/libyaml/libyaml_0.2.5.bb | 2 ++ 1 file changed, 2 insertions(+)