diff options
| author | Ross Burton <ross.burton@arm.com> | 2023-09-04 17:03:34 +0100 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2023-09-05 08:09:13 +0100 |
| commit | c6f8b183161c09e92ed193d07eeeb14e0c7cead6 (patch) | |
| tree | 1e0cbd1581df654d9fd799d5049d7ed8eba83a96 | |
| parent | 75335fc2ee03558e36550b4bb378d172aaae04ca (diff) | |
| download | poky-c6f8b183161c09e92ed193d07eeeb14e0c7cead6.tar.gz | |
cve-extra-exclusions: remove historic kernel CVEs which are handled now
The bulk of the historic kernel CVEs in this file are now handled by
the include files generated by linux/generate-cve-exclusions.py, so
remove them.
Those that remain date from 2017 or earlier, so rename the group to
'historic' and update the comment.
(From OE-Core rev: b46930641b9b5b38997b41ba8036e99387ed4225)
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
| -rw-r--r-- | meta/conf/distro/include/cve-extra-exclusions.inc | 47 |
1 files changed, 9 insertions, 38 deletions
diff --git a/meta/conf/distro/include/cve-extra-exclusions.inc b/meta/conf/distro/include/cve-extra-exclusions.inc index 9d4422bc0f..84217e4acd 100644 --- a/meta/conf/distro/include/cve-extra-exclusions.inc +++ b/meta/conf/distro/include/cve-extra-exclusions.inc | |||
| @@ -60,47 +60,18 @@ replacing bdb with supported and open source friendly alternatives. As a result | |||
| 60 | # ensure the bulk of the major kernel CVEs are fixed and we don't dive into each individual issue | 60 | # ensure the bulk of the major kernel CVEs are fixed and we don't dive into each individual issue |
| 61 | # as the stable maintainers are much more able to do that. | 61 | # as the stable maintainers are much more able to do that. |
| 62 | # | 62 | # |
| 63 | # Rather than just ignore all kernel CVEs, list the ones we ignore on this basis here, allowing new | 63 | # We have a script (generate-cve-exclusions.py) to have correct CVE status for backported issues, |
| 64 | # issues to be visible. If anyone wishes to clean up CPE entries with NIST for these, we'd | 64 | # but the data on linuxkernelcves.com isn't 100% complete for the older CVEs. These historical |
| 65 | # welcome than and then entries can likely be removed from here. | 65 | # CVEs need review and typically linuxkernelcves.com updated and then removed from here. |
| 66 | # | 66 | # |
| 67 | 67 | ||
| 68 | CVE_STATUS_GROUPS += "CVE_STATUS_KERNEL_2010 CVE_STATUS_KERNEL_2017 CVE_STATUS_KERNEL_2018 CVE_STATUS_KERNEL_2020 \ | 68 | CVE_STATUS_GROUPS += "CVE_STATUS_KERNEL_HISTORIC" |
| 69 | CVE_STATUS_KERNEL_2021 CVE_STATUS_KERNEL_2022" | ||
| 70 | 69 | ||
| 71 | # 1999-2010 | 70 | CVE_STATUS_KERNEL_HISTORIC = "CVE-1999-0524 CVE-1999-0656 CVE-2006-2932 CVE-2007-2764 CVE-2007-4998 \ |
| 72 | CVE_STATUS_KERNEL_2010 = "CVE-1999-0524 CVE-1999-0656 CVE-2006-2932 CVE-2007-2764 CVE-2007-4998 CVE-2008-2544 \ | 71 | CVE-2008-2544 CVE-2008-4609 CVE-2010-0298 CVE-2010-4563 CVE-2011-0640 \ |
| 73 | CVE-2008-4609 CVE-2010-0298 CVE-2010-4563" | 72 | CVE-2014-2648 CVE-2016-0774 CVE-2016-3695 CVE-2016-3699 CVE-2017-1000377 \ |
| 74 | CVE_STATUS_KERNEL_2010[status] = "ignored" | 73 | CVE-2017-6264" |
| 75 | 74 | CVE_STATUS_KERNEL_HISTORIC[status] = "ignored" | |
| 76 | # 2011-2017 | ||
| 77 | CVE_STATUS_KERNEL_2017 = "CVE-2011-0640 CVE-2014-2648 CVE-2014-8171 CVE-2016-0774 CVE-2016-3695 CVE-2016-3699 \ | ||
| 78 | CVE-2017-1000255 CVE-2017-1000377 CVE-2017-5897 CVE-2017-6264" | ||
| 79 | CVE_STATUS_KERNEL_2017[status] = "ignored" | ||
| 80 | |||
| 81 | # 2018 | ||
| 82 | CVE_STATUS_KERNEL_2018 = "CVE-2018-1000026 CVE-2018-10840 CVE-2018-10876 CVE-2018-10882 CVE-2018-10901 CVE-2018-10902 \ | ||
| 83 | CVE-2018-14625 CVE-2018-16880 CVE-2018-16884 CVE-2018-5873" | ||
| 84 | CVE_STATUS_KERNEL_2018[status] = "ignored" | ||
| 85 | |||
| 86 | # 2020 | ||
| 87 | CVE_STATUS_KERNEL_2020 = "CVE-2020-10732 CVE-2020-10742 CVE-2020-16119 CVE-2020-1749 CVE-2020-25672 CVE-2020-27820 CVE-2020-35501 CVE-2020-8834" | ||
| 88 | CVE_STATUS_KERNEL_2020[status] = "ignored" | ||
| 89 | |||
| 90 | # 2021 | ||
| 91 | CVE_STATUS_KERNEL_2021 = "CVE-2021-20194 CVE-2021-20226 CVE-2021-20265 CVE-2021-3564 CVE-2021-3743 CVE-2021-3847 CVE-2021-4002 \ | ||
| 92 | CVE-2021-4090 CVE-2021-4095 CVE-2021-4197 CVE-2021-4202 CVE-2021-44879 CVE-2021-45402" | ||
| 93 | CVE_STATUS_KERNEL_2021[status] = "ignored" | ||
| 94 | |||
| 95 | # 2022 | ||
| 96 | CVE_STATUS_KERNEL_2022 = "CVE-2022-0185 CVE-2022-0264 CVE-2022-0286 CVE-2022-0330 CVE-2022-0382 CVE-2022-0433 CVE-2022-0435 \ | ||
| 97 | CVE-2022-0492 CVE-2022-0494 CVE-2022-0500 CVE-2022-0516 CVE-2022-0617 CVE-2022-0742 CVE-2022-0854 \ | ||
| 98 | CVE-2022-0995 CVE-2022-0998 CVE-2022-1011 CVE-2022-1015 CVE-2022-1048 CVE-2022-1055 CVE-2022-1195 \ | ||
| 99 | CVE-2022-1353 CVE-2022-24122 CVE-2022-24448 CVE-2022-24958 CVE-2022-24959 CVE-2022-25258 CVE-2022-25265 \ | ||
| 100 | CVE-2022-25375 CVE-2022-26490 CVE-2022-26878 CVE-2022-26966 CVE-2022-27223 CVE-2022-27666 CVE-2022-27950 \ | ||
| 101 | CVE-2022-28356 CVE-2022-28388 CVE-2022-28389 CVE-2022-28390 CVE-2022-28796 CVE-2022-28893 CVE-2022-29156 \ | ||
| 102 | CVE-2022-29582 CVE-2022-29968" | ||
| 103 | CVE_STATUS_KERNEL_2022[status] = "ignored" | ||
| 104 | 75 | ||
| 105 | 76 | ||
| 106 | # https://nvd.nist.gov/vuln/detail/CVE-2022-3563 | 77 | # https://nvd.nist.gov/vuln/detail/CVE-2022-3563 |
