summaryrefslogtreecommitdiffstats
path: root/meta/conf/distro
diff options
context:
space:
mode:
authorRichard Purdie <richard.purdie@linuxfoundation.org>2021-09-06 13:49:26 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2021-09-07 21:54:11 +0100
commit8632de2d7a77042c1f1b7454d4bc3b10968bb9e4 (patch)
tree51b8b48b236a511122eaf4dbe022ebfa2f171f66 /meta/conf/distro
parent23d95eb65604bc05a730a461bafe26594bbe5e46 (diff)
downloadpoky-8632de2d7a77042c1f1b7454d4bc3b10968bb9e4.tar.gz
flex: Add CVE-2019-6293 to exclusions for checks
CVE is effectively disputed - yes there is stack exhaustion but no bug and it is building the parser, not running it, effectively similar to a compiler ICE. Upstream no plans to address and there is no security issue. https://github.com/westes/flex/issues/414 (From OE-Core rev: 0cae5d7a24bedf6784781b62cbb3795a44bab4d1) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/conf/distro')
-rw-r--r--meta/conf/distro/include/cve-extra-exclusions.inc4
1 files changed, 0 insertions, 4 deletions
diff --git a/meta/conf/distro/include/cve-extra-exclusions.inc b/meta/conf/distro/include/cve-extra-exclusions.inc
index cf07acce1d..a6f52b5de7 100644
--- a/meta/conf/distro/include/cve-extra-exclusions.inc
+++ b/meta/conf/distro/include/cve-extra-exclusions.inc
@@ -61,10 +61,6 @@ CVE_CHECK_WHITELIST += "CVE-2020-29509 CVE-2020-29511"
61# There was a proposed patch https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html 61# There was a proposed patch https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html
62# however qemu maintainers are sure the patch is incorrect and should not be applied. 62# however qemu maintainers are sure the patch is incorrect and should not be applied.
63 63
64# flex:flex-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6293
65# Upstream bug, still open: https://github.com/westes/flex/issues/414
66# Causes memory exhaustion so potential DoS but no buffer overflow, low priority
67
68# wget https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879 64# wget https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879
69# https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html 65# https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html
70# No response upstream as of 2021/5/12 66# No response upstream as of 2021/5/12