summaryrefslogtreecommitdiffstats
path: root/meta/conf/distro
diff options
context:
space:
mode:
authorAndrej Valek <andrej.valek@siemens.com>2023-07-20 09:19:50 +0200
committerRichard Purdie <richard.purdie@linuxfoundation.org>2023-07-21 11:52:26 +0100
commitc15e506a4674e558922c5a75512ca2b5c296cd44 (patch)
treea0cc1ebf9daca61304185ed901596e31f4029658 /meta/conf/distro
parent7e18a90d35a62cd6894385a9dab549a594d5f11e (diff)
downloadpoky-c15e506a4674e558922c5a75512ca2b5c296cd44.tar.gz
cve_check: convert CVE_CHECK_IGNORE to CVE_STATUS
- Try to add convert and apply statuses for old CVEs - Drop some obsolete ignores, while they are not relevant for current version (From OE-Core rev: 1634ed4048cf56788cd5c2c1bdc979b70afcdcd7) Signed-off-by: Andrej Valek <andrej.valek@siemens.com> Reviewed-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/conf/distro')
-rw-r--r--meta/conf/distro/include/cve-extra-exclusions.inc149
1 files changed, 81 insertions, 68 deletions
diff --git a/meta/conf/distro/include/cve-extra-exclusions.inc b/meta/conf/distro/include/cve-extra-exclusions.inc
index 0ae63e2c63..61fb08dbeb 100644
--- a/meta/conf/distro/include/cve-extra-exclusions.inc
+++ b/meta/conf/distro/include/cve-extra-exclusions.inc
@@ -15,44 +15,43 @@
15# the aim of sharing that work and ensuring we don't duplicate it. 15# the aim of sharing that work and ensuring we don't duplicate it.
16# 16#
17 17
18# strace https://nvd.nist.gov/vuln/detail/CVE-2000-0006
19CVE_STATUS[CVE-2000-0006] = "upstream-wontfix: CVE is more than 20 years old \
20with no resolution evident. Broken links in CVE database references make resolution impractical."
18 21
19# strace https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0006 22# epiphany https://nvd.nist.gov/vuln/detail/CVE-2005-0238
20# CVE is more than 20 years old with no resolution evident 23CVE_STATUS[CVE-2005-0238] = "upstream-wontfix: \
21# broken links in CVE database references make resolution impractical 24The issue here is spoofing of domain names using characters from other character sets. \
22CVE_CHECK_IGNORE += "CVE-2000-0006" 25There has been much discussion amongst the epiphany and webkit developers and \
23 26whilst there are improvements about how domains are handled and displayed to the user \
24# epiphany https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0238 27there is unlikely ever to be a single fix to webkit or epiphany which addresses this \
25# The issue here is spoofing of domain names using characters from other character sets. 28problem. There isn't any mitigation or fix or way to progress this further."
26# There has been much discussion amongst the epiphany and webkit developers and 29
27# whilst there are improvements about how domains are handled and displayed to the user 30# glibc https://nvd.nist.gov/vuln/detail/CVE-2010-4756
28# there is unlikely ever to be a single fix to webkit or epiphany which addresses this 31CVE_STATUS[CVE-2010-4756] = "upstream-wontfix: \
29# problem. Ignore this CVE as there isn't any mitigation or fix or way to progress this further 32Issue is memory exhaustion via glob() calls, e.g. from within an ftp server \
30# we can seem to take. 33Best discussion in https://bugzilla.redhat.com/show_bug.cgi?id=681681 \
31CVE_CHECK_IGNORE += "CVE-2005-0238" 34Upstream don't see it as a security issue, ftp servers shouldn't be passing \
32 35this to libc glob. Upstream have no plans to add BSD's GLOB_LIMIT or similar."
33# glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4756 36
34# Issue is memory exhaustion via glob() calls, e.g. from within an ftp server 37# go https://nvd.nist.gov/vuln/detail/CVE-2020-29509
35# Best discussion in https://bugzilla.redhat.com/show_bug.cgi?id=681681 38# go https://nvd.nist.gov/vuln/detail/CVE-2020-29511
36# Upstream don't see it as a security issue, ftp servers shouldn't be passing 39CVE_STATUS_GROUPS += "CVE_STATUS_GO"
37# this to libc glob. Exclude as upstream have no plans to add BSD's GLOB_LIMIT or similar 40CVE_STATUS_GO = "CVE-2020-29509 CVE-2020-29511"
38CVE_CHECK_IGNORE += "CVE-2010-4756" 41CVE_STATUS_GO[status] = "not-applicable-config: \
39 42The encoding/xml package in go can potentially be used for security exploits if not used correctly \
40# go https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29509 43CVE applies to a netapp product as well as flagging a general issue. We don't ship anything \
41# go https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29511 44exposing this interface in an exploitable way"
42# The encoding/xml package in go can potentially be used for security exploits if not used correctly
43# CVE applies to a netapp product as well as flagging a general issue. We don't ship anything
44# exposing this interface in an exploitable way
45CVE_CHECK_IGNORE += "CVE-2020-29509 CVE-2020-29511"
46 45
47# db 46# db
48# Since Oracle relicensed bdb, the open source community is slowly but surely replacing bdb with 47CVE_STATUS_GROUPS += "CVE_STATUS_DB"
49# supported and open source friendly alternatives. As a result these CVEs are unlikely to ever be fixed. 48CVE_STATUS_DB = "CVE-2015-2583 CVE-2015-2624 CVE-2015-2626 CVE-2015-2640 CVE-2015-2654 \
50CVE_CHECK_IGNORE += "CVE-2015-2583 CVE-2015-2624 CVE-2015-2626 CVE-2015-2640 CVE-2015-2654 \
51CVE-2015-2656 CVE-2015-4754 CVE-2015-4764 CVE-2015-4774 CVE-2015-4775 CVE-2015-4776 CVE-2015-4777 \ 49CVE-2015-2656 CVE-2015-4754 CVE-2015-4764 CVE-2015-4774 CVE-2015-4775 CVE-2015-4776 CVE-2015-4777 \
52CVE-2015-4778 CVE-2015-4779 CVE-2015-4780 CVE-2015-4781 CVE-2015-4782 CVE-2015-4783 CVE-2015-4784 \ 50CVE-2015-4778 CVE-2015-4779 CVE-2015-4780 CVE-2015-4781 CVE-2015-4782 CVE-2015-4783 CVE-2015-4784 \
53CVE-2015-4785 CVE-2015-4786 CVE-2015-4787 CVE-2015-4788 CVE-2015-4789 CVE-2015-4790 CVE-2016-0682 \ 51CVE-2015-4785 CVE-2015-4786 CVE-2015-4787 CVE-2015-4788 CVE-2015-4789 CVE-2015-4790 CVE-2016-0682 \
54CVE-2016-0689 CVE-2016-0692 CVE-2016-0694 CVE-2016-3418 CVE-2020-2981" 52CVE-2016-0689 CVE-2016-0692 CVE-2016-0694 CVE-2016-3418 CVE-2020-2981"
55 53CVE_STATUS_DB[status] = "upstream-wontfix: Since Oracle relicensed bdb, the open source community is slowly but surely \
54replacing bdb with supported and open source friendly alternatives. As a result this CVE is unlikely to ever be fixed."
56 55
57# 56#
58# Kernel CVEs, e.g. linux-yocto* 57# Kernel CVEs, e.g. linux-yocto*
@@ -65,50 +64,64 @@ CVE-2016-0689 CVE-2016-0692 CVE-2016-0694 CVE-2016-3418 CVE-2020-2981"
65# issues to be visible. If anyone wishes to clean up CPE entries with NIST for these, we'd 64# issues to be visible. If anyone wishes to clean up CPE entries with NIST for these, we'd
66# welcome than and then entries can likely be removed from here. 65# welcome than and then entries can likely be removed from here.
67# 66#
67
68CVE_STATUS_GROUPS += "CVE_STATUS_KERNEL_2010 CVE_STATUS_KERNEL_2017 CVE_STATUS_KERNEL_2018 CVE_STATUS_KERNEL_2020 \
69 CVE_STATUS_KERNEL_2021 CVE_STATUS_KERNEL_2022"
70
68# 1999-2010 71# 1999-2010
69CVE_CHECK_IGNORE += "CVE-1999-0524 CVE-1999-0656 CVE-2006-2932 CVE-2007-2764 CVE-2007-4998 CVE-2008-2544 \ 72CVE_STATUS_KERNEL_2010 = "CVE-1999-0524 CVE-1999-0656 CVE-2006-2932 CVE-2007-2764 CVE-2007-4998 CVE-2008-2544 \
70 CVE-2008-4609 CVE-2010-0298 CVE-2010-4563" 73 CVE-2008-4609 CVE-2010-0298 CVE-2010-4563"
74CVE_STATUS_KERNEL_2010[status] = "ignored"
75
71# 2011-2017 76# 2011-2017
72CVE_CHECK_IGNORE += "CVE-2011-0640 CVE-2014-2648 CVE-2014-8171 CVE-2016-0774 CVE-2016-3695 CVE-2016-3699 \ 77CVE_STATUS_KERNEL_2017 = "CVE-2011-0640 CVE-2014-2648 CVE-2014-8171 CVE-2016-0774 CVE-2016-3695 CVE-2016-3699 \
73 CVE-2017-1000255 CVE-2017-1000377 CVE-2017-5897 CVE-2017-6264" 78 CVE-2017-1000255 CVE-2017-1000377 CVE-2017-5897 CVE-2017-6264"
79CVE_STATUS_KERNEL_2017[status] = "ignored"
80
74# 2018 81# 2018
75CVE_CHECK_IGNORE += "CVE-2018-1000026 CVE-2018-10840 CVE-2018-10876 CVE-2018-10882 CVE-2018-10901 CVE-2018-10902 \ 82CVE_STATUS_KERNEL_2018 = "CVE-2018-1000026 CVE-2018-10840 CVE-2018-10876 CVE-2018-10882 CVE-2018-10901 CVE-2018-10902 \
76 CVE-2018-14625 CVE-2018-16880 CVE-2018-16884 CVE-2018-5873" 83 CVE-2018-14625 CVE-2018-16880 CVE-2018-16884 CVE-2018-5873"
84CVE_STATUS_KERNEL_2018[status] = "ignored"
85
77# 2020 86# 2020
78CVE_CHECK_IGNORE += "CVE-2020-10732 CVE-2020-10742 CVE-2020-16119 CVE-2020-1749 CVE-2020-25672 CVE-2020-27820 CVE-2020-35501 CVE-2020-8834" 87CVE_STATUS_KERNEL_2020 = "CVE-2020-10732 CVE-2020-10742 CVE-2020-16119 CVE-2020-1749 CVE-2020-25672 CVE-2020-27820 CVE-2020-35501 CVE-2020-8834"
88CVE_STATUS_KERNEL_2020[status] = "ignored"
89
79# 2021 90# 2021
80CVE_CHECK_IGNORE += "CVE-2021-20194 CVE-2021-20226 CVE-2021-20265 CVE-2021-3564 CVE-2021-3743 CVE-2021-3847 CVE-2021-4002 \ 91CVE_STATUS_KERNEL_2021 = "CVE-2021-20194 CVE-2021-20226 CVE-2021-20265 CVE-2021-3564 CVE-2021-3743 CVE-2021-3847 CVE-2021-4002 \
81 CVE-2021-4090 CVE-2021-4095 CVE-2021-4197 CVE-2021-4202 CVE-2021-44879 CVE-2021-45402" 92 CVE-2021-4090 CVE-2021-4095 CVE-2021-4197 CVE-2021-4202 CVE-2021-44879 CVE-2021-45402"
93CVE_STATUS_KERNEL_2021[status] = "ignored"
94
82# 2022 95# 2022
83CVE_CHECK_IGNORE += "CVE-2022-0185 CVE-2022-0264 CVE-2022-0286 CVE-2022-0330 CVE-2022-0382 CVE-2022-0433 CVE-2022-0435 \ 96CVE_STATUS_KERNEL_2022 = "CVE-2022-0185 CVE-2022-0264 CVE-2022-0286 CVE-2022-0330 CVE-2022-0382 CVE-2022-0433 CVE-2022-0435 \
84 CVE-2022-0492 CVE-2022-0494 CVE-2022-0500 CVE-2022-0516 CVE-2022-0617 CVE-2022-0742 CVE-2022-0854 \ 97 CVE-2022-0492 CVE-2022-0494 CVE-2022-0500 CVE-2022-0516 CVE-2022-0617 CVE-2022-0742 CVE-2022-0854 \
85 CVE-2022-0995 CVE-2022-0998 CVE-2022-1011 CVE-2022-1015 CVE-2022-1048 CVE-2022-1055 CVE-2022-1195 \ 98 CVE-2022-0995 CVE-2022-0998 CVE-2022-1011 CVE-2022-1015 CVE-2022-1048 CVE-2022-1055 CVE-2022-1195 \
86 CVE-2022-1353 CVE-2022-24122 CVE-2022-24448 CVE-2022-24958 CVE-2022-24959 CVE-2022-25258 CVE-2022-25265 \ 99 CVE-2022-1353 CVE-2022-24122 CVE-2022-24448 CVE-2022-24958 CVE-2022-24959 CVE-2022-25258 CVE-2022-25265 \
87 CVE-2022-25375 CVE-2022-26490 CVE-2022-26878 CVE-2022-26966 CVE-2022-27223 CVE-2022-27666 CVE-2022-27950 \ 100 CVE-2022-25375 CVE-2022-26490 CVE-2022-26878 CVE-2022-26966 CVE-2022-27223 CVE-2022-27666 CVE-2022-27950 \
88 CVE-2022-28356 CVE-2022-28388 CVE-2022-28389 CVE-2022-28390 CVE-2022-28796 CVE-2022-28893 CVE-2022-29156 \ 101 CVE-2022-28356 CVE-2022-28388 CVE-2022-28389 CVE-2022-28390 CVE-2022-28796 CVE-2022-28893 CVE-2022-29156 \
89 CVE-2022-29582 CVE-2022-29968" 102 CVE-2022-29582 CVE-2022-29968"
103CVE_STATUS_KERNEL_2022[status] = "ignored"
90 104
91 105
92# Wrong CPE in NVD database
93# https://nvd.nist.gov/vuln/detail/CVE-2022-3563 106# https://nvd.nist.gov/vuln/detail/CVE-2022-3563
94# https://nvd.nist.gov/vuln/detail/CVE-2022-3637 107# https://nvd.nist.gov/vuln/detail/CVE-2022-3637
95# Those issue do not affect the kernel, patchs listed on CVE pages links to https://git.kernel.org/pub/scm/bluetooth/bluez.git 108CVE_STATUS[CVE-2022-3563] = "cpe-incorrect: This issue do not affect the kernel, patchs listed on CVE pages links to https://git.kernel.org/pub/scm/bluetooth/bluez.git"
96CVE_CHECK_IGNORE += "CVE-2022-3563 CVE-2022-3637" 109CVE_STATUS[CVE-2022-3637] = "cpe-incorrect: This issue do not affect the kernel, patchs listed on CVE pages links to https://git.kernel.org/pub/scm/bluetooth/bluez.git"
97 110
98# qemu:qemu-native:qemu-system-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20255 111# qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2021-20255
99# There was a proposed patch https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html 112CVE_STATUS[CVE-2021-20255] = "upstream-wontfix: \
100# qemu maintainers say the patch is incorrect and should not be applied 113There was a proposed patch https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html \
101# Ignore from OE's perspectivee as the issue is of low impact, at worst sitting in an infinite loop rather than exploitable 114qemu maintainers say the patch is incorrect and should not be applied \
102CVE_CHECK_IGNORE += "CVE-2021-20255" 115The issue is of low impact, at worst sitting in an infinite loop rather than exploitable."
103 116
104# qemu:qemu-native:qemu-system-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12067 117# qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2019-12067
105# There was a proposed patch but rejected by upstream qemu. It is unclear if the issue can 118CVE_STATUS[CVE-2019-12067] = "upstream-wontfix: \
106# still be reproduced or where exactly any bug is. 119There was a proposed patch but rejected by upstream qemu. It is unclear if the issue can \
107# Ignore from OE's perspective as we'll pick up any fix when upstream accepts one. 120still be reproduced or where exactly any bug is. \
108CVE_CHECK_IGNORE += "CVE-2019-12067" 121We'll pick up any fix when upstream accepts one."
109 122
110# nasm:nasm-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18974 123# nasm:nasm-native https://nvd.nist.gov/vuln/detail/CVE-2020-18974
111# It is a fuzzing related buffer overflow. It is of low impact since most devices 124CVE_STATUS[CVE-2020-18974] = "upstream-wontfix: \
112# wouldn't expose an assembler. The upstream is inactive and there is little to be 125It is a fuzzing related buffer overflow. It is of low impact since most devices
113# done about the bug, ignore from an OE perspective. 126wouldn't expose an assembler. The upstream is inactive and there is little to be
114CVE_CHECK_IGNORE += "CVE-2020-18974" 127done about the bug, ignore from an OE perspective."