public inbox for openembedded-core@lists.openembedded.org
 help / color / mirror / Atom feed
From: "saloni" <saloni.jain@kpit.com>
To: openembedded-core@lists.openembedded.org, raj.khem@gmail.com
Cc: nisha.parrakat@kpit.com, anuj.chougule@kpit.com,
	Saloni Jain <Saloni.Jain@kpit.com>
Subject: [poky][master][PATCH] libxml2: Whitelisted CVE patches
Date: Wed, 28 Oct 2020 23:11:34 +0530	[thread overview]
Message-ID: <1603906894-22742-1-git-send-email-Saloni.Jain@kpit.com> (raw)

From: Saloni Jain <Saloni.Jain@kpit.com>

Below CVE patches are whitelisted as changes
are already present in source code:
1.CVE-2016-9596 (Duplicate of CVE-2016-3627)
Link: https://bugzilla.redhat.com/show_bug.cgi?id=1408302
Link: https://bugzilla.redhat.com/show_bug.cgi?id=1319829

2.CVE-2016-9598 (Duplicate of CVE-2016-4483)
Link: https://bugzilla.redhat.com/show_bug.cgi?id=1408306
Link: https://bugzilla.redhat.com/show_bug.cgi?id=1332820

Signed-off-by: Saloni.Jain <Saloni.Jain@kpit.com>
---
 meta/recipes-core/libxml/libxml2_2.9.10.bb | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/meta/recipes-core/libxml/libxml2_2.9.10.bb b/meta/recipes-core/libxml/libxml2_2.9.10.bb
index 90890ff..4950beb 100644
--- a/meta/recipes-core/libxml/libxml2_2.9.10.bb
+++ b/meta/recipes-core/libxml/libxml2_2.9.10.bb
@@ -24,6 +24,11 @@ SRC_URI = "http://www.xmlsoft.org/sources/libxml2-${PV}.tar.gz;name=libtar \
            file://CVE-2019-20388.patch \
            file://CVE-2020-24977.patch \
            "
+#Changes are already present in source-code, hence whitelisted.
+CVE_CHECK_WHITELIST += "\
+    CVE-2016-9596 \
+    CVE-2016-9598 \
+"

 SRC_URI[libtar.md5sum] = "10942a1dc23137a8aa07f0639cbfece5"
 SRC_URI[libtar.sha256sum] = "aafee193ffb8fe0c82d4afef6ef91972cbaf5feea100edc2f262750611b4be1f"
--
2.7.4

This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails.

             reply	other threads:[~2020-10-28 17:41 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-10-28 17:41 saloni [this message]
2020-10-28 17:47 ` [poky][master][PATCH] libxml2: Whitelisted CVE patches Khem Raj
2020-10-28 18:31 ` [OE-core] " Steve Sakoman
  -- strict thread matches above, loose matches on Subject: below --
2020-10-28 17:46 saloni

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1603906894-22742-1-git-send-email-Saloni.Jain@kpit.com \
    --to=saloni.jain@kpit.com \
    --cc=anuj.chougule@kpit.com \
    --cc=nisha.parrakat@kpit.com \
    --cc=openembedded-core@lists.openembedded.org \
    --cc=raj.khem@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox