diff options
author | Anil Dongare <adongare@cisco.com> | 2025-08-28 22:22:27 -0700 |
---|---|---|
committer | Bruce Ashfield <bruce.ashfield@gmail.com> | 2025-09-03 21:40:45 -0400 |
commit | 23dff61259191a203e92c2f766dccbe44e880aba (patch) | |
tree | 053a6ccbab33406ab7c75608f94c7fc6cab4ddb5 | |
parent | 17a69ce26e0a35790f07ad8ead7e325895db18ec (diff) | |
download | meta-virtualization-23dff61259191a203e92c2f766dccbe44e880aba.tar.gz |
grpc-go 1.59.0+git: Ignore CVE-2024-7246
Upstream Repository: https://github.com/grpc/grpc-go
Bug Details: https://nvd.nist.gov/vuln/detail/CVE-2024-7246
Type: Security Fix
CVE: CVE-2024-7246
Score: 6.3 (Medium)
Patch: https://github.com/grpc/grpc/issues/36245
Analysis:
-CVE-2024-7246 describes an HTTP/2 HPACK header table poisoning
issue found in the gRPC C-core implementation (grpc/grpc).
-The vulnerability does not apply to the pure Go implementation
(grpc-go) used in Yocto (meta-virtualization layer).
-Marking as not-applicable-config (implementation difference).
-The affected code path is not present in grpc-go.Hence ignoring the
CVE for grpc-go.
Reference:
[1] https://nvd.nist.gov/vuln/detail/CVE-2024-7246
[2] https://github.com/grpc/grpc/issues/36245
[3] Upstream gRPC release notes confirming fixed versions for gRPC
C-core (not grpc-go).
Signed-off-by: Anil Dongare <adongare@cisco.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
-rw-r--r-- | recipes-devtools/go/grpc-go_git.bb | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/recipes-devtools/go/grpc-go_git.bb b/recipes-devtools/go/grpc-go_git.bb index 839a4f9c..c2990869 100644 --- a/recipes-devtools/go/grpc-go_git.bb +++ b/recipes-devtools/go/grpc-go_git.bb | |||
@@ -41,3 +41,8 @@ FILES:${PN} += " \ | |||
41 | # some CVEs are reported with "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*" | 41 | # some CVEs are reported with "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*" |
42 | # it's better to have false positives than false negatives | 42 | # it's better to have false positives than false negatives |
43 | CVE_PRODUCT += "grpc" | 43 | CVE_PRODUCT += "grpc" |
44 | # CVE-2024-7246 is an HTTP/2 HPACK poisoning issue in gRPC C-core | ||
45 | # (C/C++ implementation, meta-openembedded). | ||
46 | # grpc-go (Go implementation in meta-virtualization) does not | ||
47 | # contain the affected HPACK code path. | ||
48 | CVE_STATUS[CVE-2024-7246] = "not-applicable-config: CVE is for grpc (C-core), not grpc-go." | ||