diff mbox series

[poky,dunfell] cve-extra-exclusions.inc: Use conditional override

Message ID 20220708120611.6577-1-akash.hadke@kpit.com
State New, archived
Headers show
Series [poky,dunfell] cve-extra-exclusions.inc: Use conditional override | expand

Commit Message

Akash Hadke July 8, 2022, 12:06 p.m. UTC
Use conditional override for CVE_CHECK_WHITELIST variable
to whitelist CVEs for specific recipe.

After including cve-extra-exclusions.inc all CVEs from
file are getting shown in whitelist list for every component even
if that CVE is not related to it.

This change can help to set actual whitelisted CVEs for
the recipe.

Signed-off-by: Akash Hadke <akash.hadke@kpit.com>
---
 meta/conf/distro/include/cve-extra-exclusions.inc | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

Comments

Steve Sakoman July 8, 2022, 5:40 p.m. UTC | #1
We're trying to keep CVE check tooling in sync across master and the
LTS branches as much as possible.

So you should submit this approach first to master, and then versions
for kirkstone and dunfell.

I appreciate your help with CVEs!

Steve

On Fri, Jul 8, 2022 at 2:07 AM akash hadke via lists.openembedded.org
<akash.hadke=kpit.com@lists.openembedded.org> wrote:
>
> Use conditional override for CVE_CHECK_WHITELIST variable
> to whitelist CVEs for specific recipe.
>
> After including cve-extra-exclusions.inc all CVEs from
> file are getting shown in whitelist list for every component even
> if that CVE is not related to it.
>
> This change can help to set actual whitelisted CVEs for
> the recipe.
>
> Signed-off-by: Akash Hadke <akash.hadke@kpit.com>
> ---
>  meta/conf/distro/include/cve-extra-exclusions.inc | 10 +++++-----
>  1 file changed, 5 insertions(+), 5 deletions(-)
>
> diff --git a/meta/conf/distro/include/cve-extra-exclusions.inc b/meta/conf/distro/include/cve-extra-exclusions.inc
> index e02a4d1fde..4c8716c1a8 100644
> --- a/meta/conf/distro/include/cve-extra-exclusions.inc
> +++ b/meta/conf/distro/include/cve-extra-exclusions.inc
> @@ -19,7 +19,7 @@
>  # strace https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0006
>  # CVE is more than 20 years old with no resolution evident
>  # broken links in CVE database references make resolution impractical
> -CVE_CHECK_WHITELIST += "CVE-2000-0006"
> +CVE_CHECK_WHITELIST:pn-strace += "CVE-2000-0006"
>
>  # epiphany https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0238
>  # The issue here is spoofing of domain names using characters from other character sets.
> @@ -28,26 +28,26 @@ CVE_CHECK_WHITELIST += "CVE-2000-0006"
>  # there is unlikely ever to be a single fix to webkit or epiphany which addresses this
>  # problem. Whitelisted as there isn't any mitigation or fix or way to progress this further
>  # we can seem to take.
> -CVE_CHECK_WHITELIST += "CVE-2005-0238"
> +CVE_CHECK_WHITELIST:pn-epiphany += "CVE-2005-0238"
>
>  # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4756
>  # Issue is memory exhaustion via glob() calls, e.g. from within an ftp server
>  # Best discussion in https://bugzilla.redhat.com/show_bug.cgi?id=681681
>  # Upstream don't see it as a security issue, ftp servers shouldn't be passing
>  # this to libc glob. Exclude as upstream have no plans to add BSD's GLOB_LIMIT or similar
> -CVE_CHECK_WHITELIST += "CVE-2010-4756"
> +CVE_CHECK_WHITELIST:pn-glibc += "CVE-2010-4756"
>
>  # go https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29509
>  # go https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29511
>  # The encoding/xml package in go can potentially be used for security exploits if not used correctly
>  # CVE applies to a netapp product as well as flagging a general issue. We don't ship anything
>  # exposing this interface in an exploitable way
> -CVE_CHECK_WHITELIST += "CVE-2020-29509 CVE-2020-29511"
> +CVE_CHECK_WHITELIST:pn-go += "CVE-2020-29509 CVE-2020-29511"
>
>  # db
>  # Since Oracle relicensed bdb, the open source community is slowly but surely replacing bdb with
>  # supported and open source friendly alternatives. As a result these CVEs are unlikely to ever be fixed.
> -CVE_CHECK_WHITELIST += "CVE-2015-2583 CVE-2015-2624 CVE-2015-2626 CVE-2015-2640 CVE-2015-2654 \
> +CVE_CHECK_WHITELIST:pn-db += "CVE-2015-2583 CVE-2015-2624 CVE-2015-2626 CVE-2015-2640 CVE-2015-2654 \
>  CVE-2015-2656 CVE-2015-4754 CVE-2015-4764 CVE-2015-4774 CVE-2015-4775 CVE-2015-4776 CVE-2015-4777 \
>  CVE-2015-4778 CVE-2015-4779 CVE-2015-4780 CVE-2015-4781 CVE-2015-4782 CVE-2015-4783 CVE-2015-4784 \
>  CVE-2015-4785 CVE-2015-4786 CVE-2015-4787 CVE-2015-4788 CVE-2015-4789 CVE-2015-4790 CVE-2016-0682 \
> --
> 2.17.1
>
>
> -=-=-=-=-=-=-=-=-=-=-=-
> Links: You receive all messages sent to this group.
> View/Reply Online (#167821): https://lists.openembedded.org/g/openembedded-core/message/167821
> Mute This Topic: https://lists.openembedded.org/mt/92249813/3620601
> Group Owner: openembedded-core+owner@lists.openembedded.org
> Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [steve@sakoman.com]
> -=-=-=-=-=-=-=-=-=-=-=-
>
diff mbox series

Patch

diff --git a/meta/conf/distro/include/cve-extra-exclusions.inc b/meta/conf/distro/include/cve-extra-exclusions.inc
index e02a4d1fde..4c8716c1a8 100644
--- a/meta/conf/distro/include/cve-extra-exclusions.inc
+++ b/meta/conf/distro/include/cve-extra-exclusions.inc
@@ -19,7 +19,7 @@ 
 # strace https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0006
 # CVE is more than 20 years old with no resolution evident
 # broken links in CVE database references make resolution impractical
-CVE_CHECK_WHITELIST += "CVE-2000-0006"
+CVE_CHECK_WHITELIST:pn-strace += "CVE-2000-0006"
 
 # epiphany https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0238
 # The issue here is spoofing of domain names using characters from other character sets.
@@ -28,26 +28,26 @@  CVE_CHECK_WHITELIST += "CVE-2000-0006"
 # there is unlikely ever to be a single fix to webkit or epiphany which addresses this
 # problem. Whitelisted as there isn't any mitigation or fix or way to progress this further
 # we can seem to take.
-CVE_CHECK_WHITELIST += "CVE-2005-0238"
+CVE_CHECK_WHITELIST:pn-epiphany += "CVE-2005-0238"
 
 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4756
 # Issue is memory exhaustion via glob() calls, e.g. from within an ftp server
 # Best discussion in https://bugzilla.redhat.com/show_bug.cgi?id=681681
 # Upstream don't see it as a security issue, ftp servers shouldn't be passing
 # this to libc glob. Exclude as upstream have no plans to add BSD's GLOB_LIMIT or similar
-CVE_CHECK_WHITELIST += "CVE-2010-4756"
+CVE_CHECK_WHITELIST:pn-glibc += "CVE-2010-4756"
 
 # go https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29509
 # go https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29511
 # The encoding/xml package in go can potentially be used for security exploits if not used correctly
 # CVE applies to a netapp product as well as flagging a general issue. We don't ship anything
 # exposing this interface in an exploitable way
-CVE_CHECK_WHITELIST += "CVE-2020-29509 CVE-2020-29511"
+CVE_CHECK_WHITELIST:pn-go += "CVE-2020-29509 CVE-2020-29511"
 
 # db
 # Since Oracle relicensed bdb, the open source community is slowly but surely replacing bdb with
 # supported and open source friendly alternatives. As a result these CVEs are unlikely to ever be fixed.
-CVE_CHECK_WHITELIST += "CVE-2015-2583 CVE-2015-2624 CVE-2015-2626 CVE-2015-2640 CVE-2015-2654 \
+CVE_CHECK_WHITELIST:pn-db += "CVE-2015-2583 CVE-2015-2624 CVE-2015-2626 CVE-2015-2640 CVE-2015-2654 \
 CVE-2015-2656 CVE-2015-4754 CVE-2015-4764 CVE-2015-4774 CVE-2015-4775 CVE-2015-4776 CVE-2015-4777 \
 CVE-2015-4778 CVE-2015-4779 CVE-2015-4780 CVE-2015-4781 CVE-2015-4782 CVE-2015-4783 CVE-2015-4784 \
 CVE-2015-4785 CVE-2015-4786 CVE-2015-4787 CVE-2015-4788 CVE-2015-4789 CVE-2015-4790 CVE-2016-0682 \