From patchwork Thu Nov 19 11:00:33 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Subject: [dunfell,3/5] python3: whitelist CVE-2020-15523 From: chee.yang.lee@intel.com X-Patchwork-Id: 178061 Message-Id: <20201119110035.70647-3-chee.yang.lee@intel.com> To: openembedded-core@lists.openembedded.org Date: Thu, 19 Nov 2020 19:00:33 +0800 From: Lee Chee Yang This CVE is issue on _Py_CheckPython3 uses uninitialized dllpath when embedder sets module path with Py_SetPath. Since it is .dll issue (on windows only), hence whitelist it. https://bugs.python.org/issue29778 Signed-off-by: Lee Chee Yang --- meta/recipes-devtools/python/python3_3.8.2.bb | 3 +++ 1 file changed, 3 insertions(+) -- 2.17.1 -=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#144818): https://lists.openembedded.org/g/openembedded-core/message/144818 Mute This Topic: https://lists.openembedded.org/mt/78362273/3616849 Group Owner: openembedded-core+owner@lists.openembedded.org Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [michael@yoctoproject.org] -=-=-=-=-=-=-=-=-=-=-=- diff --git a/meta/recipes-devtools/python/python3_3.8.2.bb b/meta/recipes-devtools/python/python3_3.8.2.bb index 169bc87988..506b60a547 100644 --- a/meta/recipes-devtools/python/python3_3.8.2.bb +++ b/meta/recipes-devtools/python/python3_3.8.2.bb @@ -54,6 +54,9 @@ CVE_PRODUCT = "python" # This is not exploitable when glibc has CVE-2016-10739 fixed. CVE_CHECK_WHITELIST += "CVE-2019-18348" +# This is windows only issue. +CVE_CHECK_WHITELIST += "CVE-2020-15523" + PYTHON_MAJMIN = "3.8" S = "${WORKDIR}/Python-${PV}"