[meta-java[dunfell] jsch: Whitelist CVE-2016-5725

Message ID 20220421134506.7421-1-pawan.badganchi@kpit.com
State New
Headers show
Series [meta-java[dunfell] jsch: Whitelist CVE-2016-5725 | expand

Commit Message

Pawan April 21, 2022, 1:45 p.m. UTC
From: Pawan Badganchi <pawan.badganchi@kpit.com>

Whitelist the CVE because it only affects windows platforms
Link: https://ubuntu.com/security/CVE-2016-5725

Signed-off-by: Pawan Badganchi<pawan.badganchi@kpit.com>
---
 recipes-core/jcraft/jsch_0.1.40.bb | 3 +++
 1 file changed, 3 insertions(+)

--
2.17.1

This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails.

Comments

Ranjitsinh Rathod May 30, 2022, 11:40 a.m. UTC | #1
Hi There,

Can you please take this on dunfell branch?

Thanks,
Ranjitsinh Rathod
Pawan Aug. 29, 2022, 8:56 a.m. UTC | #2
Hello,
Could you please add this patch in the dunfell branch as well.
Richard Leitner Aug. 29, 2022, 12:41 p.m. UTC | #3
Hi Pawan,

On Mon, Aug 29, 2022 at 01:56:21AM -0700, Pawan via lists.openembedded.org wrote:
> Hello,
> Could you please add this patch in the dunfell branch as well.

Please send a valid patch or open a GitHub or GitLab PR/MR.

Thanks and regards;rl
Pawan Sept. 15, 2022, 9:47 a.m. UTC | #4
Sent valid patch.

Patch

diff --git a/recipes-core/jcraft/jsch_0.1.40.bb b/recipes-core/jcraft/jsch_0.1.40.bb
index a0f70d8..1170095 100644
--- a/recipes-core/jcraft/jsch_0.1.40.bb
+++ b/recipes-core/jcraft/jsch_0.1.40.bb
@@ -25,5 +25,8 @@  do_compile() {
 SRC_URI[md5sum] = "b59cec19a487e95aed68378976b4b566"
 SRC_URI[sha256sum] = "ca9d2ae08fd7a8983fb00d04f0f0c216a985218a5eb364ff9bee73870f28e097"

+# Whitelist the CVE because it only affects Windows platforms
+CVE_CHECK_WHITELIST += "CVE-2016-5725"
+
 BBCLASSEXTEND = "native"