From: Peter Marko <[email protected]> These CVEs are not applicable to version 6.2.x as the vulnerable code was introduced inly in 10.0.0.
Debian made the analysis, reuse their work. * https://security-tracker.debian.org/tracker/CVE-2025-54566 * https://security-tracker.debian.org/tracker/CVE-2025-54567 Signed-off-by: Peter Marko <[email protected]> Signed-off-by: Yoann Congal <[email protected]> --- meta/recipes-devtools/qemu/qemu.inc | 3 +++ 1 file changed, 3 insertions(+) diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc index 2866cbe7ec..764f0e110a 100644 --- a/meta/recipes-devtools/qemu/qemu.inc +++ b/meta/recipes-devtools/qemu/qemu.inc @@ -169,6 +169,9 @@ CVE_CHECK_IGNORE += "CVE-2023-1386" # virtio-snd was implemented in 8.2.0, so version 6.2.0 is not yet affected CVE_CHECK_IGNORE += "CVE-2024-7730" +# These issues were introduced in v10.0.0-rc0 +CVE_CHECK_IGNORE += "CVE-2025-54566 CVE-2025-54567" + COMPATIBLE_HOST:mipsarchn32 = "null" COMPATIBLE_HOST:mipsarchn64 = "null" COMPATIBLE_HOST:riscv32 = "null"
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#229711): https://lists.openembedded.org/g/openembedded-core/message/229711 Mute This Topic: https://lists.openembedded.org/mt/117362637/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
