summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRoss Burton <ross.burton@arm.com>2023-09-05 11:54:20 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2023-09-07 14:42:37 +0100
commitd2b17a0db77c5b972a6395a058346731b3301172 (patch)
treeeff77658279d2bf5da2ca82278101c1949c13d99
parentd95c3d3b18c902d771803d6f624e6fac058b1641 (diff)
downloadpoky-d2b17a0db77c5b972a6395a058346731b3301172.tar.gz
cve-exclusion: review the last of the historical kernel CVEs
Review the last of the historical kernel CVEs. Issues which are specific to other platforms or distributions are ignored in the kernel recipe itself, whereas general security concerns like "ICMP leaks information" and "USB has flaws" are ignored with more details in the extra-exclusions file as before. (From OE-Core rev: fe1c0b9725f88d15ba48b02b5fef01f2cf2e9d78) Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r--meta/conf/distro/include/cve-extra-exclusions.inc21
-rw-r--r--meta/recipes-kernel/linux/cve-exclusion.inc12
2 files changed, 19 insertions, 14 deletions
diff --git a/meta/conf/distro/include/cve-extra-exclusions.inc b/meta/conf/distro/include/cve-extra-exclusions.inc
index cfee028e5b..fcef6a14fb 100644
--- a/meta/conf/distro/include/cve-extra-exclusions.inc
+++ b/meta/conf/distro/include/cve-extra-exclusions.inc
@@ -53,24 +53,17 @@ CVE-2016-0689 CVE-2016-0692 CVE-2016-0694 CVE-2016-3418 CVE-2020-2981"
53CVE_STATUS_DB[status] = "upstream-wontfix: Since Oracle relicensed bdb, the open source community is slowly but surely \ 53CVE_STATUS_DB[status] = "upstream-wontfix: Since Oracle relicensed bdb, the open source community is slowly but surely \
54replacing bdb with supported and open source friendly alternatives. As a result this CVE is unlikely to ever be fixed." 54replacing bdb with supported and open source friendly alternatives. As a result this CVE is unlikely to ever be fixed."
55 55
56# 56# Kernel CVEs that are generic but can't be added to the kernel's hand-maintained cve-exclusion.inc
57# Kernel CVEs, e.g. linux-yocto* 57# or machine-maintained cve-exclusion_VERSION.inc files, such as issues that describe TCP/IP design
58# flaws or processor-specific exploits that can't be mitigated.
58# 59#
59# For OE-Core our policy is to stay as close to the kernel stable releases as we can. This should 60# For OE-Core our policy is to stay as close to the kernel stable releases as we can. This should
60# ensure the bulk of the major kernel CVEs are fixed and we don't dive into each individual issue 61# ensure the bulk of the major kernel CVEs are fixed and we don't dive into each individual issue
61# as the stable maintainers are much more able to do that. 62# as the stable maintainers are much more able to do that.
62# 63CVE_STATUS[CVE-1999-0524] = "ignored: issue is that ICMP exists, can be filewalled if required"
63# We have a script (generate-cve-exclusions.py) to have correct CVE status for backported issues, 64CVE_STATUS[CVE-2008-4609] = "ignored: describes design flaws in TCP"
64# but the data on linuxkernelcves.com isn't 100% complete for the older CVEs. These historical 65CVE_STATUS[CVE-2010-4563] = "ignored: low impact, only enables detection of hosts which are sniffing network traffic"
65# CVEs need review and typically linuxkernelcves.com updated and then removed from here. 66CVE_STATUS[CVE-2011-0640] = "ignored: requires physical access and any mitigation would mean USB is impractical to use"
66#
67
68CVE_STATUS_GROUPS += "CVE_STATUS_KERNEL_HISTORIC"
69
70CVE_STATUS_KERNEL_HISTORIC = "CVE-1999-0524 CVE-1999-0656 CVE-2006-2932 CVE-2007-2764 CVE-2007-4998 \
71 CVE-2008-2544 CVE-2008-4609 CVE-2010-0298 CVE-2010-4563 CVE-2011-0640"
72CVE_STATUS_KERNEL_HISTORIC[status] = "ignored"
73
74 67
75# qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2021-20255 68# qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2021-20255
76CVE_STATUS[CVE-2021-20255] = "upstream-wontfix: \ 69CVE_STATUS[CVE-2021-20255] = "upstream-wontfix: \
diff --git a/meta/recipes-kernel/linux/cve-exclusion.inc b/meta/recipes-kernel/linux/cve-exclusion.inc
index 28f9c8ff2b..7857633943 100644
--- a/meta/recipes-kernel/linux/cve-exclusion.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion.inc
@@ -1,3 +1,15 @@
1CVE_STATUS[CVE-1999-0656] = "not-applicable-config: specific to ugidd, part of the old user-mode NFS server"
2
3CVE_STATUS[CVE-2006-2932] = "not-applicable-platform: specific to RHEL"
4
5CVE_STATUS[CVE-2007-2764] = "not-applicable-platform: specific to Sun/Brocade SilkWorm switches"
6
7CVE_STATUS[CVE-2007-4998] = "cpe-incorrect: a historic cp bug, no longer an issue as per https://bugzilla.redhat.com/show_bug.cgi?id=356471#c5"
8
9CVE_STATUS[CVE-2008-2544] = "disputed: not an issue as per https://bugzilla.redhat.com/show_bug.cgi?id=449089#c22"
10
11CVE_STATUS[CVE-2010-0298] = "fixed-version: 2.6.34 (1871c6)"
12
1CVE_STATUS[CVE-2014-2648] = "cpe-incorrect: not Linux" 13CVE_STATUS[CVE-2014-2648] = "cpe-incorrect: not Linux"
2 14
3CVE_STATUS[CVE-2016-0774] = "ignored: result of incomplete backport" 15CVE_STATUS[CVE-2016-0774] = "ignored: result of incomplete backport"