From: Niko Mauno Date: Thu, 1 Aug 2024 10:17:19 +0000 (+0300) Subject: libyaml: Amend CVE status as 'upstream-wontfix' X-Git-Tag: yocto-5.2~2236 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=c66d9a2a0d197498fa21ee8ca51a4afb59f75473;p=thirdparty%2Fopenembedded%2Fopenembedded-core-contrib.git libyaml: Amend CVE status as 'upstream-wontfix' Use an existing defined CVE_CHECK_STATUSMAP key in meta/lib/oe/cve_check.py in order to avoid following complaint from BitBake: WARNING: libyaml-native-0.2.5-r0 do_create_spdx: Invalid detail "wontfix" for CVE_STATUS[CVE-2024-35328] = "wontfix: Upstream thinks there is no working code that is exploitable - https://github.com/yaml/libyaml/issues/302", fallback to Unpatched Signed-off-by: Niko Mauno Signed-off-by: Richard Purdie --- diff --git a/meta/recipes-support/libyaml/libyaml_0.2.5.bb b/meta/recipes-support/libyaml/libyaml_0.2.5.bb index 2154910d0ca..1c6a5fcb45f 100644 --- a/meta/recipes-support/libyaml/libyaml_0.2.5.bb +++ b/meta/recipes-support/libyaml/libyaml_0.2.5.bb @@ -18,6 +18,6 @@ inherit autotools DISABLE_STATIC:class-nativesdk = "" DISABLE_STATIC:class-native = "" -CVE_STATUS[CVE-2024-35328] = "wontfix: Upstream thinks there is no working code that is exploitable - https://github.com/yaml/libyaml/issues/302" +CVE_STATUS[CVE-2024-35328] = "upstream-wontfix: Upstream thinks there is no working code that is exploitable - https://github.com/yaml/libyaml/issues/302" BBCLASSEXTEND = "native nativesdk"