diff mbox series

[meta-networking,3/3] mbedtls: Whitelist CVE-2021-43666, CVE-2021-45451

Message ID 20221004062437.2541052-3-mbriand@witekio.com
State Under Review
Headers show
Series [meta-networking,1/3] mbedtls: Fix CVE product name | expand

Commit Message

Mathieu Dubois-Briand Oct. 4, 2022, 6:24 a.m. UTC
Signed-off-by: Mathieu Dubois-Briand <mbriand@witekio.com>
---
 .../recipes-connectivity/mbedtls/mbedtls_2.28.1.bb           | 5 +++++
 1 file changed, 5 insertions(+)

Comments

Ross Burton Oct. 4, 2022, 9:33 a.m. UTC | #1
On 4 Oct 2022, at 07:24, Mathieu Dubois-Briand via lists.openembedded.org <mathieu.dubois-briand=hyprua.org@lists.openembedded.org> wrote:
> +# Fix merged upstream https://github.com/Mbed-TLS/mbedtls/pull/5310
> +CVE_CHECK_IGNORE += "CVE-2021-43666"
> +# Fix merged upstream https://github.com/Mbed-TLS/mbedtls/commit/9a4a9c66a48edfe9ece03c7e4a53310adf73a86c
> +CVE_CHECK_IGNORE += "CVE-2021-45451"

If possible it’s best to contact NIST and get the CPE entries updated instead of whitelisting, as more accurate data is always better.  It’s complicated in this situation because of the backports, but I’ve mailed them to see what can be done.

Ross
diff mbox series

Patch

diff --git a/meta-networking/recipes-connectivity/mbedtls/mbedtls_2.28.1.bb b/meta-networking/recipes-connectivity/mbedtls/mbedtls_2.28.1.bb
index 44b2a5e3c8e1..742414dd8aed 100644
--- a/meta-networking/recipes-connectivity/mbedtls/mbedtls_2.28.1.bb
+++ b/meta-networking/recipes-connectivity/mbedtls/mbedtls_2.28.1.bb
@@ -44,3 +44,8 @@  FILES:${PN}-programs = "${bindir}/"
 BBCLASSEXTEND = "native nativesdk"
 
 CVE_PRODUCT = "mbed_tls"
+
+# Fix merged upstream https://github.com/Mbed-TLS/mbedtls/pull/5310
+CVE_CHECK_IGNORE += "CVE-2021-43666"
+# Fix merged upstream https://github.com/Mbed-TLS/mbedtls/commit/9a4a9c66a48edfe9ece03c7e4a53310adf73a86c
+CVE_CHECK_IGNORE += "CVE-2021-45451"