All of lore.kernel.org
 help / color / mirror / Atom feed
* [meta-networking][meta-oe][master][dunfell][PATCH] mdns: Whitelisted CVE-2007-0613 for mdns
@ 2021-03-09  6:35 Sana Kazi
  2021-03-19 13:31 ` Sana Kazi
  0 siblings, 1 reply; 5+ messages in thread
From: Sana Kazi @ 2021-03-09  6:35 UTC (permalink / raw)
  To: Openembedded-devel, raj.khem
  Cc: nisha.parrakat, Aditya.Tayade, Harpritkaur.Bhandari

CVE-2007-0613 is not applicable as it only affects Apple products
i.e. ichat,mdnsresponder, instant message framework and MacOS.
Also, https://www.exploit-db.com/exploits/3230 shows the part of code
affected by CVE-2007-0613 which is not preset in upstream source code.
Hence, CVE-2007-0613 does not affect other Yocto implementations and
is not reported for other distros can be marked whitelisted.
Links:
https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613
https://www.incibe-cert.es/en/early-warning/vulnerabilities/cve-2007-0613
https://security-tracker.debian.org/tracker/CVE-2007-0613
https://ubuntu.com/security/CVE-2007-0613
https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613
---
 .../recipes-protocols/mdns/mdns_1310.40.42.bb       | 13 +++++++++++++
 1 file changed, 13 insertions(+)

diff --git a/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb b/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
index 445ed87e4..60bc26bf1 100644
--- a/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
+++ b/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
@@ -27,6 +27,19 @@ SRC_URI[sha256sum] = "bea29e1616cd56ccb8f88c0fad2bcdc4031f4deb2d899c793e2f27a838

 CVE_PRODUCT = "apple:mdnsresponder"

+# CVE-2007-0613 is not applicable as it only affects Apple products
+# i.e. ichat,mdnsresponder, instant message framework and MacOS.
+# Also, https://www.exploit-db.com/exploits/3230 shows the part of code
+# affected by CVE-2007-0613 which is not preset in upstream source code.
+# Hence, CVE-2007-0613 does not affect other Yocto implementations and
+# is not reported for other distros can be marked whitelisted.
+# Links:
+# https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613
+# https://www.incibe-cert.es/en/early-warning/vulnerabilities/cve-2007-0613
+# https://security-tracker.debian.org/tracker/CVE-2007-0613
+# https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613
+CVE_CHECK_WHITELIST += "CVE-2007-0613"
+
 PARALLEL_MAKE = ""

 S = "${WORKDIR}/mDNSResponder-${PV}/mDNSPosix"
--
2.17.1

This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails.

^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: [meta-networking][meta-oe][master][dunfell][PATCH] mdns: Whitelisted CVE-2007-0613 for mdns
  2021-03-09  6:35 [meta-networking][meta-oe][master][dunfell][PATCH] mdns: Whitelisted CVE-2007-0613 for mdns Sana Kazi
@ 2021-03-19 13:31 ` Sana Kazi
  2021-03-19 16:41   ` Khem Raj
  0 siblings, 1 reply; 5+ messages in thread
From: Sana Kazi @ 2021-03-19 13:31 UTC (permalink / raw)
  To: Openembedded-devel, Khem Raj

[-- Attachment #1: Type: text/plain, Size: 3259 bytes --]

Hi Team,

Could you please review below patch to be upstreamed for mdns


 Thanks & Regards,

 Sana Kazi
 KPIT Technologies Limited


________________________________
From: Sana Kazi <Sana.Kazi@kpit.com>
Sent: Tuesday, March 9, 2021 12:06 PM
To: Openembedded-devel@lists.openembedded.org <Openembedded-devel@lists.openembedded.org>; raj.khem@gmail.com <raj.khem@gmail.com>
Cc: Nisha Parrakat <Nisha.Parrakat@kpit.com>; Aditya Tayade <Aditya.Tayade@kpit.com>; Harpritkaur Bhandari <Harpritkaur.Bhandari@kpit.com>
Subject: [meta-networking][meta-oe][master][dunfell][PATCH] mdns: Whitelisted CVE-2007-0613 for mdns

CVE-2007-0613 is not applicable as it only affects Apple products
i.e. ichat,mdnsresponder, instant message framework and MacOS.
Also, https://www.exploit-db.com/exploits/3230 shows the part of code
affected by CVE-2007-0613 which is not preset in upstream source code.
Hence, CVE-2007-0613 does not affect other Yocto implementations and
is not reported for other distros can be marked whitelisted.
Links:
https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613
https://www.incibe-cert.es/en/early-warning/vulnerabilities/cve-2007-0613
https://security-tracker.debian.org/tracker/CVE-2007-0613
https://ubuntu.com/security/CVE-2007-0613
https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613
---
 .../recipes-protocols/mdns/mdns_1310.40.42.bb       | 13 +++++++++++++
 1 file changed, 13 insertions(+)

diff --git a/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb b/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
index 445ed87e4..60bc26bf1 100644
--- a/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
+++ b/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
@@ -27,6 +27,19 @@ SRC_URI[sha256sum] = "bea29e1616cd56ccb8f88c0fad2bcdc4031f4deb2d899c793e2f27a838

 CVE_PRODUCT = "apple:mdnsresponder"

+# CVE-2007-0613 is not applicable as it only affects Apple products
+# i.e. ichat,mdnsresponder, instant message framework and MacOS.
+# Also, https://www.exploit-db.com/exploits/3230 shows the part of code
+# affected by CVE-2007-0613 which is not preset in upstream source code.
+# Hence, CVE-2007-0613 does not affect other Yocto implementations and
+# is not reported for other distros can be marked whitelisted.
+# Links:
+# https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613
+# https://www.incibe-cert.es/en/early-warning/vulnerabilities/cve-2007-0613
+# https://security-tracker.debian.org/tracker/CVE-2007-0613
+# https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613
+CVE_CHECK_WHITELIST += "CVE-2007-0613"
+
 PARALLEL_MAKE = ""

 S = "${WORKDIR}/mDNSResponder-${PV}/mDNSPosix"
--
2.17.1

This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails.

[-- Attachment #2: Type: text/html, Size: 7015 bytes --]

^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: [meta-networking][meta-oe][master][dunfell][PATCH] mdns: Whitelisted CVE-2007-0613 for mdns
  2021-03-19 13:31 ` Sana Kazi
@ 2021-03-19 16:41   ` Khem Raj
  2021-03-19 17:16     ` Sana Kazi
  0 siblings, 1 reply; 5+ messages in thread
From: Khem Raj @ 2021-03-19 16:41 UTC (permalink / raw)
  To: Sana Kazi, Openembedded-devel

Hello Sana

It was in latest pull from Armin which was merged today
it should be in already in dunfell now. Let us know if not.

On 3/19/21 6:31 AM, Sana Kazi wrote:
> Hi Team,
> 
> Could you please review below patch to be upstreamed for mdns
> 
> 
> Thanks & Regards,
> 
> Sana Kazi
>   KPIT Technologies Limited
> 
> 
> 
> ------------------------------------------------------------------------
> *From:* Sana Kazi <Sana.Kazi@kpit.com>
> *Sent:* Tuesday, March 9, 2021 12:06 PM
> *To:* Openembedded-devel@lists.openembedded.org 
> <Openembedded-devel@lists.openembedded.org>; raj.khem@gmail.com 
> <raj.khem@gmail.com>
> *Cc:* Nisha Parrakat <Nisha.Parrakat@kpit.com>; Aditya Tayade 
> <Aditya.Tayade@kpit.com>; Harpritkaur Bhandari 
> <Harpritkaur.Bhandari@kpit.com>
> *Subject:* [meta-networking][meta-oe][master][dunfell][PATCH] mdns: 
> Whitelisted CVE-2007-0613 for mdns
> CVE-2007-0613 is not applicable as it only affects Apple products
> i.e. ichat,mdnsresponder, instant message framework and MacOS.
> Also, https://www.exploit-db.com/exploits/3230 
> <https://www.exploit-db.com/exploits/3230> shows the part of code
> affected by CVE-2007-0613 which is not preset in upstream source code.
> Hence, CVE-2007-0613 does not affect other Yocto implementations and
> is not reported for other distros can be marked whitelisted.
> Links:
> https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613 
> <https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613>
> https://www.incibe-cert.es/en/early-warning/vulnerabilities/cve-2007-0613 <https://www.incibe-cert.es/en/early-warning/vulnerabilities/cve-2007-0613>
> https://security-tracker.debian.org/tracker/CVE-2007-0613 
> <https://security-tracker.debian.org/tracker/CVE-2007-0613>
> https://ubuntu.com/security/CVE-2007-0613 
> <https://ubuntu.com/security/CVE-2007-0613>
> https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613 
> <https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613>
> ---
>   .../recipes-protocols/mdns/mdns_1310.40.42.bb       | 13 +++++++++++++
>   1 file changed, 13 insertions(+)
> 
> diff --git a/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb 
> b/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
> index 445ed87e4..60bc26bf1 100644
> --- a/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
> +++ b/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
> @@ -27,6 +27,19 @@ SRC_URI[sha256sum] = 
> "bea29e1616cd56ccb8f88c0fad2bcdc4031f4deb2d899c793e2f27a838
> 
>   CVE_PRODUCT = "apple:mdnsresponder"
> 
> +# CVE-2007-0613 is not applicable as it only affects Apple products
> +# i.e. ichat,mdnsresponder, instant message framework and MacOS.
> +# Also, https://www.exploit-db.com/exploits/3230 
> <https://www.exploit-db.com/exploits/3230> shows the part of code
> +# affected by CVE-2007-0613 which is not preset in upstream source code.
> +# Hence, CVE-2007-0613 does not affect other Yocto implementations and
> +# is not reported for other distros can be marked whitelisted.
> +# Links:
> +# https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613 
> <https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613>
> +# 
> https://www.incibe-cert.es/en/early-warning/vulnerabilities/cve-2007-0613 <https://www.incibe-cert.es/en/early-warning/vulnerabilities/cve-2007-0613>
> +# https://security-tracker.debian.org/tracker/CVE-2007-0613 
> <https://security-tracker.debian.org/tracker/CVE-2007-0613>
> +# https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613 
> <https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613>
> +CVE_CHECK_WHITELIST += "CVE-2007-0613"
> +
>   PARALLEL_MAKE = ""
> 
>   S = "${WORKDIR}/mDNSResponder-${PV}/mDNSPosix"
> -- 
> 2.17.1
> 
> This message contains information that may be privileged or confidential 
> and is the property of the KPIT Technologies Ltd. It is intended only 
> for the person to whom it is addressed. If you are not the intended 
> recipient, you are not authorized to read, print, retain copy, 
> disseminate, distribute, or use this message or any part thereof. If you 
> receive this message in error, please notify the sender immediately and 
> delete all copies of this message. KPIT Technologies Ltd. does not 
> accept any liability for virus infected mails.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [meta-networking][meta-oe][master][dunfell][PATCH] mdns: Whitelisted CVE-2007-0613 for mdns
  2021-03-19 16:41   ` Khem Raj
@ 2021-03-19 17:16     ` Sana Kazi
  2021-03-19 17:36       ` Khem Raj
  0 siblings, 1 reply; 5+ messages in thread
From: Sana Kazi @ 2021-03-19 17:16 UTC (permalink / raw)
  To: Khem Raj, Openembedded-devel; +Cc: Harpritkaur Bhandari, Nisha Parrakat

[-- Attachment #1: Type: text/plain, Size: 13627 bytes --]

Hi,

It is merged in dunfell but not yet in master. Are you planning to merge it in master?

 Thanks & Regards,

 Sana Kazi
 KPIT Technologies Limited


________________________________
From: Khem Raj <raj.khem@gmail.com>
Sent: Friday, March 19, 2021 10:11 PM
To: Sana Kazi <Sana.Kazi@kpit.com>; Openembedded-devel@lists.openembedded.org <Openembedded-devel@lists.openembedded.org>
Subject: Re: [meta-networking][meta-oe][master][dunfell][PATCH] mdns: Whitelisted CVE-2007-0613 for mdns

Hello Sana

It was in latest pull from Armin which was merged today
it should be in already in dunfell now. Let us know if not.

On 3/19/21 6:31 AM, Sana Kazi wrote:
> Hi Team,
>
> Could you please review below patch to be upstreamed for mdns
>
>
> Thanks & Regards,
>
> Sana Kazi
>   KPIT Technologies Limited
>
>
>
> ------------------------------------------------------------------------
> *From:* Sana Kazi <Sana.Kazi@kpit.com>
> *Sent:* Tuesday, March 9, 2021 12:06 PM
> *To:* Openembedded-devel@lists.openembedded.org
> <Openembedded-devel@lists.openembedded.org>; raj.khem@gmail.com
> <raj.khem@gmail.com>
> *Cc:* Nisha Parrakat <Nisha.Parrakat@kpit.com>; Aditya Tayade
> <Aditya.Tayade@kpit.com>; Harpritkaur Bhandari
> <Harpritkaur.Bhandari@kpit.com>
> *Subject:* [meta-networking][meta-oe][master][dunfell][PATCH] mdns:
> Whitelisted CVE-2007-0613 for mdns
> CVE-2007-0613 is not applicable as it only affects Apple products
> i.e. ichat,mdnsresponder, instant message framework and MacOS.
> Also, https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.exploit-db.com%2Fexploits%2F3230&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742865584%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=zEEydQaidbnLPHjwC8eq4k%2Fb%2FThn53dRfqsUwy5KU%2FE%3D&amp;reserved=0
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.exploit-db.com%2Fexploits%2F3230&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742865584%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=zEEydQaidbnLPHjwC8eq4k%2Fb%2FThn53dRfqsUwy5KU%2FE%3D&amp;reserved=0> shows the part of code
> affected by CVE-2007-0613 which is not preset in upstream source code.
> Hence, CVE-2007-0613 does not affect other Yocto implementations and
> is not reported for other distros can be marked whitelisted.
> Links:
> https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=eAkjsIawSp2YHJL3bqORC%2B%2FRdxYVRKFIJ998sPA%2B%2FZ4%3D&amp;reserved=0
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=eAkjsIawSp2YHJL3bqORC%2B%2FRdxYVRKFIJ998sPA%2B%2FZ4%3D&amp;reserved=0>
> https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.incibe-cert.es%2Fen%2Fearly-warning%2Fvulnerabilities%2Fcve-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=5qInEtds3j9aCQPBzoNNgwnjrpkNc%2BlkDXmk2gvoHOA%3D&amp;reserved=0 <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.incibe-cert.es%2Fen%2Fearly-warning%2Fvulnerabilities%2Fcve-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=5qInEtds3j9aCQPBzoNNgwnjrpkNc%2BlkDXmk2gvoHOA%3D&amp;reserved=0>
> https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=QW82iXTsR0a1LvT5gIku8EJux9cOlpzzGCVIOCa1FFQ%3D&amp;reserved=0
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=QW82iXTsR0a1LvT5gIku8EJux9cOlpzzGCVIOCa1FFQ%3D&amp;reserved=0>
> https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fubuntu.com%2Fsecurity%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=FMQ7vLzfqsCYHu7p9B4JSH1abFYkWeWQOk3yMuB%2BnQ0%3D&amp;reserved=0
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fubuntu.com%2Fsecurity%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=FMQ7vLzfqsCYHu7p9B4JSH1abFYkWeWQOk3yMuB%2BnQ0%3D&amp;reserved=0>
> https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=eAkjsIawSp2YHJL3bqORC%2B%2FRdxYVRKFIJ998sPA%2B%2FZ4%3D&amp;reserved=0
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=eAkjsIawSp2YHJL3bqORC%2B%2FRdxYVRKFIJ998sPA%2B%2FZ4%3D&amp;reserved=0>
> ---
>   .../recipes-protocols/mdns/mdns_1310.40.42.bb       | 13 +++++++++++++
>   1 file changed, 13 insertions(+)
>
> diff --git a/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
> b/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
> index 445ed87e4..60bc26bf1 100644
> --- a/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
> +++ b/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
> @@ -27,6 +27,19 @@ SRC_URI[sha256sum] =
> "bea29e1616cd56ccb8f88c0fad2bcdc4031f4deb2d899c793e2f27a838
>
>   CVE_PRODUCT = "apple:mdnsresponder"
>
> +# CVE-2007-0613 is not applicable as it only affects Apple products
> +# i.e. ichat,mdnsresponder, instant message framework and MacOS.
> +# Also, https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.exploit-db.com%2Fexploits%2F3230&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=7RyM%2BxWeWU864nFuczXCD5AfylR3G0mL17Yeh5Nodgo%3D&amp;reserved=0
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.exploit-db.com%2Fexploits%2F3230&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=7RyM%2BxWeWU864nFuczXCD5AfylR3G0mL17Yeh5Nodgo%3D&amp;reserved=0> shows the part of code
> +# affected by CVE-2007-0613 which is not preset in upstream source code.
> +# Hence, CVE-2007-0613 does not affect other Yocto implementations and
> +# is not reported for other distros can be marked whitelisted.
> +# Links:
> +# https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=eAkjsIawSp2YHJL3bqORC%2B%2FRdxYVRKFIJ998sPA%2B%2FZ4%3D&amp;reserved=0
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=fh4GpdLsYilHYJgEcMicpxx7wSuX%2BrCe6rxosiIHs%2B0%3D&amp;reserved=0>
> +#
> https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.incibe-cert.es%2Fen%2Fearly-warning%2Fvulnerabilities%2Fcve-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=HE4%2FBCOYYIwDEuyNr3P0NZMhAJQm7V9BrxVkYDtKmEk%3D&amp;reserved=0 <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.incibe-cert.es%2Fen%2Fearly-warning%2Fvulnerabilities%2Fcve-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=HE4%2FBCOYYIwDEuyNr3P0NZMhAJQm7V9BrxVkYDtKmEk%3D&amp;reserved=0>
> +# https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=qAwcUbbb0SGYvixtamLooD4aqCM27Y%2BHhl7K26lHPCg%3D&amp;reserved=0
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=qAwcUbbb0SGYvixtamLooD4aqCM27Y%2BHhl7K26lHPCg%3D&amp;reserved=0>
> +# https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=fh4GpdLsYilHYJgEcMicpxx7wSuX%2BrCe6rxosiIHs%2B0%3D&amp;reserved=0
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=fh4GpdLsYilHYJgEcMicpxx7wSuX%2BrCe6rxosiIHs%2B0%3D&amp;reserved=0>
> +CVE_CHECK_WHITELIST += "CVE-2007-0613"
> +
>   PARALLEL_MAKE = ""
>
>   S = "${WORKDIR}/mDNSResponder-${PV}/mDNSPosix"
> --
> 2.17.1
>
> This message contains information that may be privileged or confidential
> and is the property of the KPIT Technologies Ltd. It is intended only
> for the person to whom it is addressed. If you are not the intended
> recipient, you are not authorized to read, print, retain copy,
> disseminate, distribute, or use this message or any part thereof. If you
> receive this message in error, please notify the sender immediately and
> delete all copies of this message. KPIT Technologies Ltd. does not
> accept any liability for virus infected mails.
This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails.

[-- Attachment #2: Type: text/html, Size: 27165 bytes --]

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [meta-networking][meta-oe][master][dunfell][PATCH] mdns: Whitelisted CVE-2007-0613 for mdns
  2021-03-19 17:16     ` Sana Kazi
@ 2021-03-19 17:36       ` Khem Raj
  0 siblings, 0 replies; 5+ messages in thread
From: Khem Raj @ 2021-03-19 17:36 UTC (permalink / raw)
  To: Sana Kazi, Openembedded-devel; +Cc: Harpritkaur Bhandari, Nisha Parrakat



On 3/19/21 10:16 AM, Sana Kazi wrote:
> Hi,
> 
> It is merged in dunfell but not yet in master. Are you planning to merge 
> it in master?
> 

Please update you copies isnt it this one
https://git.openembedded.org/meta-openembedded/commit/?id=f37e5423da984b7dc721d52f04673d3afc0879a1

> Thanks & Regards,
> 
> Sana Kazi
>   KPIT Technologies Limited
> 
> 
> 
> ------------------------------------------------------------------------
> *From:* Khem Raj <raj.khem@gmail.com>
> *Sent:* Friday, March 19, 2021 10:11 PM
> *To:* Sana Kazi <Sana.Kazi@kpit.com>; 
> Openembedded-devel@lists.openembedded.org 
> <Openembedded-devel@lists.openembedded.org>
> *Subject:* Re: [meta-networking][meta-oe][master][dunfell][PATCH] mdns: 
> Whitelisted CVE-2007-0613 for mdns
> Hello Sana
> 
> It was in latest pull from Armin which was merged today
> it should be in already in dunfell now. Let us know if not.
> 
> On 3/19/21 6:31 AM, Sana Kazi wrote:
>> Hi Team,
>> 
>> Could you please review below patch to be upstreamed for mdns
>> 
>> 
>> Thanks & Regards,
>> 
>> Sana Kazi
>>   KPIT Technologies Limited
>> 
>> 
>> 
>> ------------------------------------------------------------------------
>> *From:* Sana Kazi <Sana.Kazi@kpit.com>
>> *Sent:* Tuesday, March 9, 2021 12:06 PM
>> *To:* Openembedded-devel@lists.openembedded.org 
>> <Openembedded-devel@lists.openembedded.org>; raj.khem@gmail.com 
>> <raj.khem@gmail.com>
>> *Cc:* Nisha Parrakat <Nisha.Parrakat@kpit.com>; Aditya Tayade 
>> <Aditya.Tayade@kpit.com>; Harpritkaur Bhandari 
>> <Harpritkaur.Bhandari@kpit.com>
>> *Subject:* [meta-networking][meta-oe][master][dunfell][PATCH] mdns: 
>> Whitelisted CVE-2007-0613 for mdns
>> CVE-2007-0613 is not applicable as it only affects Apple products
>> i.e. ichat,mdnsresponder, instant message framework and MacOS.
>> Also, https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.exploit-db.com%2Fexploits%2F3230&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742865584%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=zEEydQaidbnLPHjwC8eq4k%2Fb%2FThn53dRfqsUwy5KU%2FE%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.exploit-db.com%2Fexploits%2F3230&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742865584%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=zEEydQaidbnLPHjwC8eq4k%2Fb%2FThn53dRfqsUwy5KU%2FE%3D&amp;reserved=0> 
> 
>> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.exploit-db.com%2Fexploits%2F3230&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742865584%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=zEEydQaidbnLPHjwC8eq4k%2Fb%2FThn53dRfqsUwy5KU%2FE%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.exploit-db.com%2Fexploits%2F3230&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742865584%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=zEEydQaidbnLPHjwC8eq4k%2Fb%2FThn53dRfqsUwy5KU%2FE%3D&amp;reserved=0>> 
> shows the part of code
>> affected by CVE-2007-0613 which is not preset in upstream source code.
>> Hence, CVE-2007-0613 does not affect other Yocto implementations and
>> is not reported for other distros can be marked whitelisted.
>> Links:
>> https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=eAkjsIawSp2YHJL3bqORC%2B%2FRdxYVRKFIJ998sPA%2B%2FZ4%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=eAkjsIawSp2YHJL3bqORC%2B%2FRdxYVRKFIJ998sPA%2B%2FZ4%3D&amp;reserved=0> 
> 
>> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=eAkjsIawSp2YHJL3bqORC%2B%2FRdxYVRKFIJ998sPA%2B%2FZ4%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=eAkjsIawSp2YHJL3bqORC%2B%2FRdxYVRKFIJ998sPA%2B%2FZ4%3D&amp;reserved=0>>
>> https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.incibe-cert.es%2Fen%2Fearly-warning%2Fvulnerabilities%2Fcve-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=5qInEtds3j9aCQPBzoNNgwnjrpkNc%2BlkDXmk2gvoHOA%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.incibe-cert.es%2Fen%2Fearly-warning%2Fvulnerabilities%2Fcve-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=5qInEtds3j9aCQPBzoNNgwnjrpkNc%2BlkDXmk2gvoHOA%3D&amp;reserved=0> 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.incibe-cert.es%2Fen%2Fearly-warning%2Fvulnerabilities%2Fcve-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=5qInEtds3j9aCQPBzoNNgwnjrpkNc%2BlkDXmk2gvoHOA%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.incibe-cert.es%2Fen%2Fearly-warning%2Fvulnerabilities%2Fcve-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=5qInEtds3j9aCQPBzoNNgwnjrpkNc%2BlkDXmk2gvoHOA%3D&amp;reserved=0>>
>> https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=QW82iXTsR0a1LvT5gIku8EJux9cOlpzzGCVIOCa1FFQ%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=QW82iXTsR0a1LvT5gIku8EJux9cOlpzzGCVIOCa1FFQ%3D&amp;reserved=0> 
> 
>> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=QW82iXTsR0a1LvT5gIku8EJux9cOlpzzGCVIOCa1FFQ%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=QW82iXTsR0a1LvT5gIku8EJux9cOlpzzGCVIOCa1FFQ%3D&amp;reserved=0>>
>> https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fubuntu.com%2Fsecurity%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=FMQ7vLzfqsCYHu7p9B4JSH1abFYkWeWQOk3yMuB%2BnQ0%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fubuntu.com%2Fsecurity%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=FMQ7vLzfqsCYHu7p9B4JSH1abFYkWeWQOk3yMuB%2BnQ0%3D&amp;reserved=0> 
> 
>> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fubuntu.com%2Fsecurity%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=FMQ7vLzfqsCYHu7p9B4JSH1abFYkWeWQOk3yMuB%2BnQ0%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fubuntu.com%2Fsecurity%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=FMQ7vLzfqsCYHu7p9B4JSH1abFYkWeWQOk3yMuB%2BnQ0%3D&amp;reserved=0>>
>> https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=eAkjsIawSp2YHJL3bqORC%2B%2FRdxYVRKFIJ998sPA%2B%2FZ4%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=eAkjsIawSp2YHJL3bqORC%2B%2FRdxYVRKFIJ998sPA%2B%2FZ4%3D&amp;reserved=0> 
> 
>> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=eAkjsIawSp2YHJL3bqORC%2B%2FRdxYVRKFIJ998sPA%2B%2FZ4%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=eAkjsIawSp2YHJL3bqORC%2B%2FRdxYVRKFIJ998sPA%2B%2FZ4%3D&amp;reserved=0>>
>> ---
>>   .../recipes-protocols/mdns/mdns_1310.40.42.bb       | 13 +++++++++++++
>>   1 file changed, 13 insertions(+)
>> 
>> diff --git a/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb 
>> b/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
>> index 445ed87e4..60bc26bf1 100644
>> --- a/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
>> +++ b/meta-networking/recipes-protocols/mdns/mdns_1310.40.42.bb
>> @@ -27,6 +27,19 @@ SRC_URI[sha256sum] = 
>> "bea29e1616cd56ccb8f88c0fad2bcdc4031f4deb2d899c793e2f27a838
>> 
>>   CVE_PRODUCT = "apple:mdnsresponder"
>> 
>> +# CVE-2007-0613 is not applicable as it only affects Apple products
>> +# i.e. ichat,mdnsresponder, instant message framework and MacOS.
>> +# Also, https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.exploit-db.com%2Fexploits%2F3230&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=7RyM%2BxWeWU864nFuczXCD5AfylR3G0mL17Yeh5Nodgo%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.exploit-db.com%2Fexploits%2F3230&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=7RyM%2BxWeWU864nFuczXCD5AfylR3G0mL17Yeh5Nodgo%3D&amp;reserved=0> 
> 
>> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.exploit-db.com%2Fexploits%2F3230&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=7RyM%2BxWeWU864nFuczXCD5AfylR3G0mL17Yeh5Nodgo%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.exploit-db.com%2Fexploits%2F3230&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=7RyM%2BxWeWU864nFuczXCD5AfylR3G0mL17Yeh5Nodgo%3D&amp;reserved=0>> 
> shows the part of code
>> +# affected by CVE-2007-0613 which is not preset in upstream source code.
>> +# Hence, CVE-2007-0613 does not affect other Yocto implementations and
>> +# is not reported for other distros can be marked whitelisted.
>> +# Links:
>> +# https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=eAkjsIawSp2YHJL3bqORC%2B%2FRdxYVRKFIJ998sPA%2B%2FZ4%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742875586%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=eAkjsIawSp2YHJL3bqORC%2B%2FRdxYVRKFIJ998sPA%2B%2FZ4%3D&amp;reserved=0> 
> 
>> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=fh4GpdLsYilHYJgEcMicpxx7wSuX%2BrCe6rxosiIHs%2B0%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=fh4GpdLsYilHYJgEcMicpxx7wSuX%2BrCe6rxosiIHs%2B0%3D&amp;reserved=0>>
>> +# 
>> https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.incibe-cert.es%2Fen%2Fearly-warning%2Fvulnerabilities%2Fcve-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=HE4%2FBCOYYIwDEuyNr3P0NZMhAJQm7V9BrxVkYDtKmEk%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.incibe-cert.es%2Fen%2Fearly-warning%2Fvulnerabilities%2Fcve-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=HE4%2FBCOYYIwDEuyNr3P0NZMhAJQm7V9BrxVkYDtKmEk%3D&amp;reserved=0> 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.incibe-cert.es%2Fen%2Fearly-warning%2Fvulnerabilities%2Fcve-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=HE4%2FBCOYYIwDEuyNr3P0NZMhAJQm7V9BrxVkYDtKmEk%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.incibe-cert.es%2Fen%2Fearly-warning%2Fvulnerabilities%2Fcve-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=HE4%2FBCOYYIwDEuyNr3P0NZMhAJQm7V9BrxVkYDtKmEk%3D&amp;reserved=0>>
>> +# https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=qAwcUbbb0SGYvixtamLooD4aqCM27Y%2BHhl7K26lHPCg%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=qAwcUbbb0SGYvixtamLooD4aqCM27Y%2BHhl7K26lHPCg%3D&amp;reserved=0> 
> 
>> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=qAwcUbbb0SGYvixtamLooD4aqCM27Y%2BHhl7K26lHPCg%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=qAwcUbbb0SGYvixtamLooD4aqCM27Y%2BHhl7K26lHPCg%3D&amp;reserved=0>>
>> +# https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=fh4GpdLsYilHYJgEcMicpxx7wSuX%2BrCe6rxosiIHs%2B0%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=fh4GpdLsYilHYJgEcMicpxx7wSuX%2BrCe6rxosiIHs%2B0%3D&amp;reserved=0> 
> 
>> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=fh4GpdLsYilHYJgEcMicpxx7wSuX%2BrCe6rxosiIHs%2B0%3D&amp;reserved=0 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvulmon.com%2Fvulnerabilitydetails%3Fqid%3DCVE-2007-0613&amp;data=04%7C01%7CSana.Kazi%40kpit.com%7Ca14a00000eb0436f8fb708d8eaf5caef%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637517688742885578%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=fh4GpdLsYilHYJgEcMicpxx7wSuX%2BrCe6rxosiIHs%2B0%3D&amp;reserved=0>>
>> +CVE_CHECK_WHITELIST += "CVE-2007-0613"
>> +
>>   PARALLEL_MAKE = ""
>> 
>>   S = "${WORKDIR}/mDNSResponder-${PV}/mDNSPosix"
>> -- 
>> 2.17.1
>> 
>> This message contains information that may be privileged or confidential 
>> and is the property of the KPIT Technologies Ltd. It is intended only 
>> for the person to whom it is addressed. If you are not the intended 
>> recipient, you are not authorized to read, print, retain copy, 
>> disseminate, distribute, or use this message or any part thereof. If you 
>> receive this message in error, please notify the sender immediately and 
>> delete all copies of this message. KPIT Technologies Ltd. does not 
>> accept any liability for virus infected mails.
> This message contains information that may be privileged or confidential 
> and is the property of the KPIT Technologies Ltd. It is intended only 
> for the person to whom it is addressed. If you are not the intended 
> recipient, you are not authorized to read, print, retain copy, 
> disseminate, distribute, or use this message or any part thereof. If you 
> receive this message in error, please notify the sender immediately and 
> delete all copies of this message. KPIT Technologies Ltd. does not 
> accept any liability for virus infected mails.

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2021-03-19 17:36 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-03-09  6:35 [meta-networking][meta-oe][master][dunfell][PATCH] mdns: Whitelisted CVE-2007-0613 for mdns Sana Kazi
2021-03-19 13:31 ` Sana Kazi
2021-03-19 16:41   ` Khem Raj
2021-03-19 17:16     ` Sana Kazi
2021-03-19 17:36       ` Khem Raj

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.