Message ID | 20231114063501.195289-1-pooadire@cisco.com |
---|---|
State | Accepted, archived |
Delegated to: | Steve Sakoman |
Headers | show |
Series | [dunfell] qemu: Whitelist CVE | expand |
Rather than whitelist, the upstream database should be corrected. Please send an email to cpe_dictionary@nist.gov explaining why the database entry is incorrect, providing supporting links. It is always best to correct the database in cases like this. Steve On Mon, Nov 13, 2023 at 8:35 PM poojitha adireddy via lists.openembedded.org <pooadire=cisco.com@lists.openembedded.org> wrote: > > Reason: > CVE-2021-3947, issue introduced in v6.0.0-rc0 > Reference: > https://security-tracker.debian.org/tracker/CVE-2021-3947 > > Dunfell utilizes qemu v4.2.0, Hence whitelisting the CVE. > > Signed-off-by: poojitha adireddy <pooadire@cisco.com> > --- > meta/recipes-devtools/qemu/qemu.inc | 3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc > index e6b26aba88..9734a9719f 100644 > --- a/meta/recipes-devtools/qemu/qemu.inc > +++ b/meta/recipes-devtools/qemu/qemu.inc > @@ -167,6 +167,9 @@ CVE_CHECK_WHITELIST += "CVE-2020-27661" > # this bug related to windows specific. > CVE_CHECK_WHITELIST += "CVE-2023-0664" > > +# the issue introduced in v6.0.0-rc0 > +CVE_CHECK_WHITELIST += "CVE-2021-3947" > + > COMPATIBLE_HOST_mipsarchn32 = "null" > COMPATIBLE_HOST_mipsarchn64 = "null" > > -- > 2.33.0 > > > -=-=-=-=-=-=-=-=-=-=-=- > Links: You receive all messages sent to this group. > View/Reply Online (#190487): https://lists.openembedded.org/g/openembedded-core/message/190487 > Mute This Topic: https://lists.openembedded.org/mt/102579083/3620601 > Group Owner: openembedded-core+owner@lists.openembedded.org > Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [steve@sakoman.com] > -=-=-=-=-=-=-=-=-=-=-=- >
diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc index e6b26aba88..9734a9719f 100644 --- a/meta/recipes-devtools/qemu/qemu.inc +++ b/meta/recipes-devtools/qemu/qemu.inc @@ -167,6 +167,9 @@ CVE_CHECK_WHITELIST += "CVE-2020-27661" # this bug related to windows specific. CVE_CHECK_WHITELIST += "CVE-2023-0664" +# the issue introduced in v6.0.0-rc0 +CVE_CHECK_WHITELIST += "CVE-2021-3947" + COMPATIBLE_HOST_mipsarchn32 = "null" COMPATIBLE_HOST_mipsarchn64 = "null"
Reason: CVE-2021-3947, issue introduced in v6.0.0-rc0 Reference: https://security-tracker.debian.org/tracker/CVE-2021-3947 Dunfell utilizes qemu v4.2.0, Hence whitelisting the CVE. Signed-off-by: poojitha adireddy <pooadire@cisco.com> --- meta/recipes-devtools/qemu/qemu.inc | 3 +++ 1 file changed, 3 insertions(+)