diff options
author | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-09-06 13:49:26 +0100 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-09-07 21:54:11 +0100 |
commit | 8632de2d7a77042c1f1b7454d4bc3b10968bb9e4 (patch) | |
tree | 51b8b48b236a511122eaf4dbe022ebfa2f171f66 /meta/conf/distro | |
parent | 23d95eb65604bc05a730a461bafe26594bbe5e46 (diff) | |
download | poky-8632de2d7a77042c1f1b7454d4bc3b10968bb9e4.tar.gz |
flex: Add CVE-2019-6293 to exclusions for checks
CVE is effectively disputed - yes there is stack exhaustion but no bug and it
is building the parser, not running it, effectively similar to a compiler ICE.
Upstream no plans to address and there is no security issue.
https://github.com/westes/flex/issues/414
(From OE-Core rev: 0cae5d7a24bedf6784781b62cbb3795a44bab4d1)
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/conf/distro')
-rw-r--r-- | meta/conf/distro/include/cve-extra-exclusions.inc | 4 |
1 files changed, 0 insertions, 4 deletions
diff --git a/meta/conf/distro/include/cve-extra-exclusions.inc b/meta/conf/distro/include/cve-extra-exclusions.inc index cf07acce1d..a6f52b5de7 100644 --- a/meta/conf/distro/include/cve-extra-exclusions.inc +++ b/meta/conf/distro/include/cve-extra-exclusions.inc | |||
@@ -61,10 +61,6 @@ CVE_CHECK_WHITELIST += "CVE-2020-29509 CVE-2020-29511" | |||
61 | # There was a proposed patch https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html | 61 | # There was a proposed patch https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html |
62 | # however qemu maintainers are sure the patch is incorrect and should not be applied. | 62 | # however qemu maintainers are sure the patch is incorrect and should not be applied. |
63 | 63 | ||
64 | # flex:flex-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6293 | ||
65 | # Upstream bug, still open: https://github.com/westes/flex/issues/414 | ||
66 | # Causes memory exhaustion so potential DoS but no buffer overflow, low priority | ||
67 | |||
68 | # wget https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879 | 64 | # wget https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879 |
69 | # https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html | 65 | # https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html |
70 | # No response upstream as of 2021/5/12 | 66 | # No response upstream as of 2021/5/12 |