Rather than whitelist, the upstream database should be corrected.

Please send an email to [email protected] explaining why the
database entry is incorrect, providing supporting links.

It is always best to correct the database in cases like this.

Steve

On Mon, Nov 13, 2023 at 8:35 PM poojitha adireddy via
lists.openembedded.org <[email protected]>
wrote:
>
> Reason:
> CVE-2021-3947, issue introduced in v6.0.0-rc0
> Reference:
> https://security-tracker.debian.org/tracker/CVE-2021-3947
>
> Dunfell utilizes qemu v4.2.0, Hence whitelisting the CVE.
>
> Signed-off-by: poojitha adireddy <[email protected]>
> ---
>  meta/recipes-devtools/qemu/qemu.inc | 3 +++
>  1 file changed, 3 insertions(+)
>
> diff --git a/meta/recipes-devtools/qemu/qemu.inc 
> b/meta/recipes-devtools/qemu/qemu.inc
> index e6b26aba88..9734a9719f 100644
> --- a/meta/recipes-devtools/qemu/qemu.inc
> +++ b/meta/recipes-devtools/qemu/qemu.inc
> @@ -167,6 +167,9 @@ CVE_CHECK_WHITELIST += "CVE-2020-27661"
>  # this bug related to windows specific.
>  CVE_CHECK_WHITELIST += "CVE-2023-0664"
>
> +# the issue introduced in v6.0.0-rc0
> +CVE_CHECK_WHITELIST += "CVE-2021-3947"
> +
>  COMPATIBLE_HOST_mipsarchn32 = "null"
>  COMPATIBLE_HOST_mipsarchn64 = "null"
>
> --
> 2.33.0
>
>
> 
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#190732): 
https://lists.openembedded.org/g/openembedded-core/message/190732
Mute This Topic: https://lists.openembedded.org/mt/102579083/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to