summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRichard Purdie <richard.purdie@linuxfoundation.org>2021-09-06 13:49:26 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2021-09-07 21:54:11 +0100
commit8632de2d7a77042c1f1b7454d4bc3b10968bb9e4 (patch)
tree51b8b48b236a511122eaf4dbe022ebfa2f171f66
parent23d95eb65604bc05a730a461bafe26594bbe5e46 (diff)
downloadpoky-8632de2d7a77042c1f1b7454d4bc3b10968bb9e4.tar.gz
flex: Add CVE-2019-6293 to exclusions for checks
CVE is effectively disputed - yes there is stack exhaustion but no bug and it is building the parser, not running it, effectively similar to a compiler ICE. Upstream no plans to address and there is no security issue. https://github.com/westes/flex/issues/414 (From OE-Core rev: 0cae5d7a24bedf6784781b62cbb3795a44bab4d1) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r--meta/conf/distro/include/cve-extra-exclusions.inc4
-rw-r--r--meta/recipes-devtools/flex/flex_2.6.4.bb5
2 files changed, 5 insertions, 4 deletions
diff --git a/meta/conf/distro/include/cve-extra-exclusions.inc b/meta/conf/distro/include/cve-extra-exclusions.inc
index cf07acce1d..a6f52b5de7 100644
--- a/meta/conf/distro/include/cve-extra-exclusions.inc
+++ b/meta/conf/distro/include/cve-extra-exclusions.inc
@@ -61,10 +61,6 @@ CVE_CHECK_WHITELIST += "CVE-2020-29509 CVE-2020-29511"
61# There was a proposed patch https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html 61# There was a proposed patch https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html
62# however qemu maintainers are sure the patch is incorrect and should not be applied. 62# however qemu maintainers are sure the patch is incorrect and should not be applied.
63 63
64# flex:flex-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6293
65# Upstream bug, still open: https://github.com/westes/flex/issues/414
66# Causes memory exhaustion so potential DoS but no buffer overflow, low priority
67
68# wget https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879 64# wget https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879
69# https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html 65# https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html
70# No response upstream as of 2021/5/12 66# No response upstream as of 2021/5/12
diff --git a/meta/recipes-devtools/flex/flex_2.6.4.bb b/meta/recipes-devtools/flex/flex_2.6.4.bb
index 56f5b742e2..6a47ef1bd8 100644
--- a/meta/recipes-devtools/flex/flex_2.6.4.bb
+++ b/meta/recipes-devtools/flex/flex_2.6.4.bb
@@ -28,6 +28,11 @@ SRC_URI[sha256sum] = "e87aae032bf07c26f85ac0ed3250998c37621d95f8bd748b31f15b33c4
28UPSTREAM_CHECK_URI = "https://github.com/westes/flex/releases" 28UPSTREAM_CHECK_URI = "https://github.com/westes/flex/releases"
29UPSTREAM_CHECK_REGEX = "flex-(?P<pver>\d+(\.\d+)+)\.tar" 29UPSTREAM_CHECK_REGEX = "flex-(?P<pver>\d+(\.\d+)+)\.tar"
30 30
31# Disputed - yes there is stack exhaustion but no bug and it is building the
32# parser, not running it, effectively similar to a compiler ICE. Upstream no plans to address
33# https://github.com/westes/flex/issues/414
34CVE_CHECK_WHITELIST += "CVE-2019-6293"
35
31inherit autotools gettext texinfo ptest 36inherit autotools gettext texinfo ptest
32 37
33M4 = "${bindir}/m4" 38M4 = "${bindir}/m4"