summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMarta Rybczynska <rybczynska@gmail.com>2024-08-14 07:30:36 +0200
committerRichard Purdie <richard.purdie@linuxfoundation.org>2024-08-20 14:12:40 +0100
commitebc872441686e09708a23b0ee1d6d865481fbc09 (patch)
tree288d43b8e80e0a22955839bf37f9c001cf634b3e
parentbf34db143956294d64998beb3a83f46c1e39d9d9 (diff)
downloadpoky-ebc872441686e09708a23b0ee1d6d865481fbc09.tar.gz
cve-extra-inclusions: encode CPEs of affected packages
Add the new cpe:vendor:product tagging to entries in cve-extra-inclusions, using product/vendor combinations that are already present in OE-core (usually there is no specific vendor). (From OE-Core rev: e1bf43561093b3b9215cde9e9f7d80b4ffcdc64e) Signed-off-by: Marta Rybczynska <marta.rybczynska@syslinbit.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r--meta/conf/distro/include/cve-extra-exclusions.inc24
1 files changed, 12 insertions, 12 deletions
diff --git a/meta/conf/distro/include/cve-extra-exclusions.inc b/meta/conf/distro/include/cve-extra-exclusions.inc
index fcef6a14fb..ffbbb7bef1 100644
--- a/meta/conf/distro/include/cve-extra-exclusions.inc
+++ b/meta/conf/distro/include/cve-extra-exclusions.inc
@@ -16,11 +16,11 @@
16# 16#
17 17
18# strace https://nvd.nist.gov/vuln/detail/CVE-2000-0006 18# strace https://nvd.nist.gov/vuln/detail/CVE-2000-0006
19CVE_STATUS[CVE-2000-0006] = "upstream-wontfix: CVE is more than 20 years old \ 19CVE_STATUS[CVE-2000-0006] = "upstream-wontfix: cpe:*:strace: CVE is more than 20 years old \
20with no resolution evident. Broken links in CVE database references make resolution impractical." 20with no resolution evident. Broken links in CVE database references make resolution impractical."
21 21
22# epiphany https://nvd.nist.gov/vuln/detail/CVE-2005-0238 22# epiphany https://nvd.nist.gov/vuln/detail/CVE-2005-0238
23CVE_STATUS[CVE-2005-0238] = "upstream-wontfix: \ 23CVE_STATUS[CVE-2005-0238] = "upstream-wontfix: cpe:*:epiphany: \
24The issue here is spoofing of domain names using characters from other character sets. \ 24The issue here is spoofing of domain names using characters from other character sets. \
25There has been much discussion amongst the epiphany and webkit developers and \ 25There has been much discussion amongst the epiphany and webkit developers and \
26whilst there are improvements about how domains are handled and displayed to the user \ 26whilst there are improvements about how domains are handled and displayed to the user \
@@ -28,7 +28,7 @@ there is unlikely ever to be a single fix to webkit or epiphany which addresses
28problem. There isn't any mitigation or fix or way to progress this further." 28problem. There isn't any mitigation or fix or way to progress this further."
29 29
30# glibc https://nvd.nist.gov/vuln/detail/CVE-2010-4756 30# glibc https://nvd.nist.gov/vuln/detail/CVE-2010-4756
31CVE_STATUS[CVE-2010-4756] = "upstream-wontfix: \ 31CVE_STATUS[CVE-2010-4756] = "upstream-wontfix: cpe:*:glibc: \
32Issue is memory exhaustion via glob() calls, e.g. from within an ftp server \ 32Issue is memory exhaustion via glob() calls, e.g. from within an ftp server \
33Best discussion in https://bugzilla.redhat.com/show_bug.cgi?id=681681 \ 33Best discussion in https://bugzilla.redhat.com/show_bug.cgi?id=681681 \
34Upstream don't see it as a security issue, ftp servers shouldn't be passing \ 34Upstream don't see it as a security issue, ftp servers shouldn't be passing \
@@ -38,7 +38,7 @@ this to libc glob. Upstream have no plans to add BSD's GLOB_LIMIT or similar."
38# go https://nvd.nist.gov/vuln/detail/CVE-2020-29511 38# go https://nvd.nist.gov/vuln/detail/CVE-2020-29511
39CVE_STATUS_GROUPS += "CVE_STATUS_GO" 39CVE_STATUS_GROUPS += "CVE_STATUS_GO"
40CVE_STATUS_GO = "CVE-2020-29509 CVE-2020-29511" 40CVE_STATUS_GO = "CVE-2020-29509 CVE-2020-29511"
41CVE_STATUS_GO[status] = "not-applicable-config: \ 41CVE_STATUS_GO[status] = "not-applicable-config: cpe:golang:go: \
42The encoding/xml package in go can potentially be used for security exploits if not used correctly \ 42The encoding/xml package in go can potentially be used for security exploits if not used correctly \
43CVE applies to a netapp product as well as flagging a general issue. We don't ship anything \ 43CVE applies to a netapp product as well as flagging a general issue. We don't ship anything \
44exposing this interface in an exploitable way" 44exposing this interface in an exploitable way"
@@ -50,7 +50,7 @@ CVE-2015-2656 CVE-2015-4754 CVE-2015-4764 CVE-2015-4774 CVE-2015-4775 CVE-2015-4
50CVE-2015-4778 CVE-2015-4779 CVE-2015-4780 CVE-2015-4781 CVE-2015-4782 CVE-2015-4783 CVE-2015-4784 \ 50CVE-2015-4778 CVE-2015-4779 CVE-2015-4780 CVE-2015-4781 CVE-2015-4782 CVE-2015-4783 CVE-2015-4784 \
51CVE-2015-4785 CVE-2015-4786 CVE-2015-4787 CVE-2015-4788 CVE-2015-4789 CVE-2015-4790 CVE-2016-0682 \ 51CVE-2015-4785 CVE-2015-4786 CVE-2015-4787 CVE-2015-4788 CVE-2015-4789 CVE-2015-4790 CVE-2016-0682 \
52CVE-2016-0689 CVE-2016-0692 CVE-2016-0694 CVE-2016-3418 CVE-2020-2981" 52CVE-2016-0689 CVE-2016-0692 CVE-2016-0694 CVE-2016-3418 CVE-2020-2981"
53CVE_STATUS_DB[status] = "upstream-wontfix: Since Oracle relicensed bdb, the open source community is slowly but surely \ 53CVE_STATUS_DB[status] = "upstream-wontfix: cpe:*:berkeley_db: Since Oracle relicensed bdb, the open source community is slowly but surely \
54replacing bdb with supported and open source friendly alternatives. As a result this CVE is unlikely to ever be fixed." 54replacing bdb with supported and open source friendly alternatives. As a result this CVE is unlikely to ever be fixed."
55 55
56# Kernel CVEs that are generic but can't be added to the kernel's hand-maintained cve-exclusion.inc 56# Kernel CVEs that are generic but can't be added to the kernel's hand-maintained cve-exclusion.inc
@@ -60,25 +60,25 @@ replacing bdb with supported and open source friendly alternatives. As a result
60# For OE-Core our policy is to stay as close to the kernel stable releases as we can. This should 60# For OE-Core our policy is to stay as close to the kernel stable releases as we can. This should
61# ensure the bulk of the major kernel CVEs are fixed and we don't dive into each individual issue 61# ensure the bulk of the major kernel CVEs are fixed and we don't dive into each individual issue
62# as the stable maintainers are much more able to do that. 62# as the stable maintainers are much more able to do that.
63CVE_STATUS[CVE-1999-0524] = "ignored: issue is that ICMP exists, can be filewalled if required" 63CVE_STATUS[CVE-1999-0524] = "ignored: cpe:*:linux_kernel:issue is that ICMP exists, can be filewalled if required"
64CVE_STATUS[CVE-2008-4609] = "ignored: describes design flaws in TCP" 64CVE_STATUS[CVE-2008-4609] = "ignored: cpe:*:linux_kernel:describes design flaws in TCP"
65CVE_STATUS[CVE-2010-4563] = "ignored: low impact, only enables detection of hosts which are sniffing network traffic" 65CVE_STATUS[CVE-2010-4563] = "ignored: cpe:*:linux_kernel:low impact, only enables detection of hosts which are sniffing network traffic"
66CVE_STATUS[CVE-2011-0640] = "ignored: requires physical access and any mitigation would mean USB is impractical to use" 66CVE_STATUS[CVE-2011-0640] = "ignored: cpe:*:linux_kernel:requires physical access and any mitigation would mean USB is impractical to use"
67 67
68# qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2021-20255 68# qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2021-20255
69CVE_STATUS[CVE-2021-20255] = "upstream-wontfix: \ 69CVE_STATUS[CVE-2021-20255] = "upstream-wontfix: cpe:*:qemu: \
70There was a proposed patch https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html \ 70There was a proposed patch https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html \
71qemu maintainers say the patch is incorrect and should not be applied \ 71qemu maintainers say the patch is incorrect and should not be applied \
72The issue is of low impact, at worst sitting in an infinite loop rather than exploitable." 72The issue is of low impact, at worst sitting in an infinite loop rather than exploitable."
73 73
74# qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2019-12067 74# qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2019-12067
75CVE_STATUS[CVE-2019-12067] = "upstream-wontfix: \ 75CVE_STATUS[CVE-2019-12067] = "upstream-wontfix: cpe:*:qemu: \
76There was a proposed patch but rejected by upstream qemu. It is unclear if the issue can \ 76There was a proposed patch but rejected by upstream qemu. It is unclear if the issue can \
77still be reproduced or where exactly any bug is. \ 77still be reproduced or where exactly any bug is. \
78We'll pick up any fix when upstream accepts one." 78We'll pick up any fix when upstream accepts one."
79 79
80# nasm:nasm-native https://nvd.nist.gov/vuln/detail/CVE-2020-18974 80# nasm:nasm-native https://nvd.nist.gov/vuln/detail/CVE-2020-18974
81CVE_STATUS[CVE-2020-18974] = "upstream-wontfix: \ 81CVE_STATUS[CVE-2020-18974] = "upstream-wontfix: cpe:*:netwide_assembler: \
82It is a fuzzing related buffer overflow. It is of low impact since most devices \ 82It is a fuzzing related buffer overflow. It is of low impact since most devices \
83wouldn't expose an assembler. The upstream is inactive and there is little to be \ 83wouldn't expose an assembler. The upstream is inactive and there is little to be \
84done about the bug, ignore from an OE perspective." 84done about the bug, ignore from an OE perspective."