Details: https://nvd.nist.gov/vuln/detail/CVE-2026-0994

The vulnerability impacts only the python bindings of protobuf, which
is in a separate recipe (python3-protobuf, where it is patched).

Ignore this CVE in this recipe due to this.

Signed-off-by: Gyorgy Sarvari <[email protected]>
---
 meta-oe/recipes-devtools/protobuf/protobuf_3.19.6.bb | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/meta-oe/recipes-devtools/protobuf/protobuf_3.19.6.bb 
b/meta-oe/recipes-devtools/protobuf/protobuf_3.19.6.bb
index 95a76514a5..4cab00fc4d 100644
--- a/meta-oe/recipes-devtools/protobuf/protobuf_3.19.6.bb
+++ b/meta-oe/recipes-devtools/protobuf/protobuf_3.19.6.bb
@@ -37,6 +37,9 @@ EXTRA_OECONF += "--with-protoc=echo"
 TEST_SRC_DIR = "examples"
 LANG_SUPPORT = "cpp ${@bb.utils.contains('PACKAGECONFIG', 'python', 'python', 
'', d)}"
 
+# the vulnerability is in python3-protobuf recipe, not in this one
+CVE_CHECK_IGNORE += "CVE-2026-0994"
+
 do_compile_ptest() {
        mkdir -p "${B}/${TEST_SRC_DIR}"
 
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#124680): 
https://lists.openembedded.org/g/openembedded-devel/message/124680
Mute This Topic: https://lists.openembedded.org/mt/118012899/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to