diff mbox series

[kirkstone,1/7] libyaml: Ignore CVE-2024-35325

Message ID a28240d49c111050e253e373507ac3094b74f6e1.1725022186.git.steve@sakoman.com
State Accepted, archived
Commit a28240d49c111050e253e373507ac3094b74f6e1
Delegated to: Steve Sakoman
Headers show
Series [kirkstone,1/7] libyaml: Ignore CVE-2024-35325 | expand

Commit Message

Steve Sakoman Aug. 30, 2024, 12:52 p.m. UTC
From: Peter Marko <peter.marko@siemens.com>

This is similar CVE as the previous ones from the same author.
https://github.com/yaml/libyaml/issues/303 explain why this is misuse
(or wrong use) of libyaml.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
 meta/recipes-support/libyaml/libyaml_0.2.5.bb | 2 ++
 1 file changed, 2 insertions(+)
diff mbox series

Patch

diff --git a/meta/recipes-support/libyaml/libyaml_0.2.5.bb b/meta/recipes-support/libyaml/libyaml_0.2.5.bb
index e30dc5a43f..514c60779c 100644
--- a/meta/recipes-support/libyaml/libyaml_0.2.5.bb
+++ b/meta/recipes-support/libyaml/libyaml_0.2.5.bb
@@ -20,5 +20,7 @@  DISABLE_STATIC:class-native = ""
 
 # upstream-wontfix: Upstream thinks there is no working code that is exploitable - https://github.com/yaml/libyaml/issues/302
 CVE_CHECK_IGNORE += "CVE-2024-35326 CVE-2024-35328"
+# upstream-wontfix: Upstream thinks this is a misuse (or wrong use) of the libyaml API - https://github.com/yaml/libyaml/issues/303
+CVE_CHECK_IGNORE += "CVE-2024-35325"
 
 BBCLASSEXTEND = "native nativesdk"