summaryrefslogtreecommitdiffstats
path: root/meta
diff options
context:
space:
mode:
authorRichard Purdie <richard.purdie@linuxfoundation.org>2021-09-06 13:49:26 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2021-09-14 17:27:42 +0100
commit6aa55dd279b14b34f334b8d70f7046720fc6764d (patch)
tree843b53cdee073fc58ecc5d48e66efc98ff16bdad /meta
parent50ea49f3d97a66c5157073c57cfe6a3992e86254 (diff)
downloadpoky-6aa55dd279b14b34f334b8d70f7046720fc6764d.tar.gz
flex: Add CVE-2019-6293 to exclusions for checks
CVE is effectively disputed - yes there is stack exhaustion but no bug and it is building the parser, not running it, effectively similar to a compiler ICE. Upstream no plans to address and there is no security issue. https://github.com/westes/flex/issues/414 (From OE-Core rev: b939b005b06be58a276d565f755ee2d8f3e5dfc1) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 0cae5d7a24bedf6784781b62cbb3795a44bab4d1) Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r--meta/conf/distro/include/cve-extra-exclusions.inc4
-rw-r--r--meta/recipes-devtools/flex/flex_2.6.4.bb5
2 files changed, 5 insertions, 4 deletions
diff --git a/meta/conf/distro/include/cve-extra-exclusions.inc b/meta/conf/distro/include/cve-extra-exclusions.inc
index cf07acce1d..a6f52b5de7 100644
--- a/meta/conf/distro/include/cve-extra-exclusions.inc
+++ b/meta/conf/distro/include/cve-extra-exclusions.inc
@@ -61,10 +61,6 @@ CVE_CHECK_WHITELIST += "CVE-2020-29509 CVE-2020-29511"
61# There was a proposed patch https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html 61# There was a proposed patch https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html
62# however qemu maintainers are sure the patch is incorrect and should not be applied. 62# however qemu maintainers are sure the patch is incorrect and should not be applied.
63 63
64# flex:flex-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6293
65# Upstream bug, still open: https://github.com/westes/flex/issues/414
66# Causes memory exhaustion so potential DoS but no buffer overflow, low priority
67
68# wget https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879 64# wget https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879
69# https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html 65# https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html
70# No response upstream as of 2021/5/12 66# No response upstream as of 2021/5/12
diff --git a/meta/recipes-devtools/flex/flex_2.6.4.bb b/meta/recipes-devtools/flex/flex_2.6.4.bb
index 1d43d2228a..50d3bf8de1 100644
--- a/meta/recipes-devtools/flex/flex_2.6.4.bb
+++ b/meta/recipes-devtools/flex/flex_2.6.4.bb
@@ -26,6 +26,11 @@ SRC_URI[sha256sum] = "e87aae032bf07c26f85ac0ed3250998c37621d95f8bd748b31f15b33c4
26UPSTREAM_CHECK_URI = "https://github.com/westes/flex/releases" 26UPSTREAM_CHECK_URI = "https://github.com/westes/flex/releases"
27UPSTREAM_CHECK_REGEX = "flex-(?P<pver>\d+(\.\d+)+)\.tar" 27UPSTREAM_CHECK_REGEX = "flex-(?P<pver>\d+(\.\d+)+)\.tar"
28 28
29# Disputed - yes there is stack exhaustion but no bug and it is building the
30# parser, not running it, effectively similar to a compiler ICE. Upstream no plans to address
31# https://github.com/westes/flex/issues/414
32CVE_CHECK_WHITELIST += "CVE-2019-6293"
33
29inherit autotools gettext texinfo ptest 34inherit autotools gettext texinfo ptest
30 35
31M4 = "${bindir}/m4" 36M4 = "${bindir}/m4"