]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/commitdiff
libyaml: Ignore CVE-2024-35325
authorPeter Marko <peter.marko@siemens.com>
Sun, 25 Aug 2024 21:41:44 +0000 (23:41 +0200)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Tue, 27 Aug 2024 10:57:20 +0000 (11:57 +0100)
This is similar CVE as the previous ones from the same author.
https://github.com/yaml/libyaml/issues/303 explain why this is misuse
(or wrong use) of libyaml.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-support/libyaml/libyaml_0.2.5.bb

index 334d9113d226a200206fad5a6362ee6fb43eedcb..aa7fc5e9145b58b5d6d7b1c041477eb7969aa494 100644 (file)
@@ -18,6 +18,7 @@ inherit autotools
 DISABLE_STATIC:class-nativesdk = ""
 DISABLE_STATIC:class-native = ""
 
+CVE_STATUS[CVE-2024-35325] = "upstream-wontfix: Upstream thinks this is a misuse (or wrong use) of the libyaml API - https://github.com/yaml/libyaml/issues/303"
 CVE_STATUS[CVE-2024-35326] = "upstream-wontfix: Upstream thinks there is no working code that is exploitable - https://github.com/yaml/libyaml/issues/302"
 CVE_STATUS[CVE-2024-35328] = "upstream-wontfix: Upstream thinks there is no working code that is exploitable - https://github.com/yaml/libyaml/issues/302"