Message ID | 20250729014948.2625032-1-raj.khem@gmail.com |
---|---|
State | New |
Headers | show |
Series | glibc: Refresh CVE backports after 2.42 release | expand |
diff --git a/meta/recipes-core/glibc/glibc_2.42.bb b/meta/recipes-core/glibc/glibc_2.42.bb index 56d974e8986..f9c1cdc2f14 100644 --- a/meta/recipes-core/glibc/glibc_2.42.bb +++ b/meta/recipes-core/glibc/glibc_2.42.bb @@ -17,7 +17,7 @@ Allows for ASLR bypass so can bypass some hardening, not an exploit in itself, m easier access for another. 'ASLR bypass itself is not a vulnerability.'" CVE_STATUS_GROUPS += "CVE_STATUS_STABLE_BACKPORTS" -CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-4802 CVE-2025-5702 CVE-2025-5745" +CVE_STATUS_STABLE_BACKPORTS = "" CVE_STATUS_STABLE_BACKPORTS[status] = "cpe-stable-backport: fix available in used git hash" DEPENDS += "gperf-native bison-native"
CVE-2025-4802 is already addressed in 2.39+ [1] Other two are part of 2.42 release [1] https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e Signed-off-by: Khem Raj <raj.khem@gmail.com> --- meta/recipes-core/glibc/glibc_2.42.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)