Details: https://nvd.nist.gov/vuln/detail/CVE-2026-0994
The vulnerability impacts only the python bindings of protobuf, which is in a separate recipe (python3-protobuf, where it is patched). Ignore this CVE in this recipe due to this. Signed-off-by: Gyorgy Sarvari <[email protected]> --- meta-oe/recipes-devtools/protobuf/protobuf_3.19.6.bb | 3 +++ 1 file changed, 3 insertions(+) diff --git a/meta-oe/recipes-devtools/protobuf/protobuf_3.19.6.bb b/meta-oe/recipes-devtools/protobuf/protobuf_3.19.6.bb index 95a76514a5..4cab00fc4d 100644 --- a/meta-oe/recipes-devtools/protobuf/protobuf_3.19.6.bb +++ b/meta-oe/recipes-devtools/protobuf/protobuf_3.19.6.bb @@ -37,6 +37,9 @@ EXTRA_OECONF += "--with-protoc=echo" TEST_SRC_DIR = "examples" LANG_SUPPORT = "cpp ${@bb.utils.contains('PACKAGECONFIG', 'python', 'python', '', d)}" +# the vulnerability is in python3-protobuf recipe, not in this one +CVE_CHECK_IGNORE += "CVE-2026-0994" + do_compile_ptest() { mkdir -p "${B}/${TEST_SRC_DIR}"
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#124680): https://lists.openembedded.org/g/openembedded-devel/message/124680 Mute This Topic: https://lists.openembedded.org/mt/118012899/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
