Commit Graph

28 Commits

Author SHA1 Message Date
Ross Burton
d2b17a0db7 cve-exclusion: review the last of the historical kernel CVEs
Review the last of the historical kernel CVEs.  Issues which are
specific to other platforms or distributions are ignored in the kernel
recipe itself, whereas general security concerns like "ICMP leaks
information" and "USB has flaws" are ignored with more details in the
extra-exclusions file as before.

(From OE-Core rev: fe1c0b9725f88d15ba48b02b5fef01f2cf2e9d78)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-09-07 14:42:37 +01:00
Ross Burton
0dd973297d linux: review some historic CVE_STATUS
Do manual review and disposition these CVEs as appropriate.

(From OE-Core rev: a8db0735e228465715cf885d3b889fddfd68efc6)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-09-06 17:52:45 +01:00
Ross Burton
7837dcdb44 cve-extra-exclusions: remove BlueZ issues
These BlueZ issues were mislabelled as Linux issues, but now that the
CPE data is accurate this ignore can be removed.

(From OE-Core rev: 7f354aed364b17259a642cc97e30a0a2b8218134)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-09-05 08:09:13 +01:00
Ross Burton
c6f8b18316 cve-extra-exclusions: remove historic kernel CVEs which are handled now
The bulk of the historic kernel CVEs in this file are now handled by
the include files generated by linux/generate-cve-exclusions.py, so
remove them.

Those that remain date from 2017 or earlier, so rename the group to
'historic' and update the comment.

(From OE-Core rev: b46930641b9b5b38997b41ba8036e99387ed4225)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-09-05 08:09:13 +01:00
Peter Marko
7ed65df80f cve-extra-exclusions: fix syntax error
CVE_STATUS conversion for CVE-2020-18974 dad a syntax error
by not adding continuation backslash.

(From OE-Core rev: 64d2f868485c32b459df80c5aafdff14cce70f26)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-07-25 15:27:33 +01:00
Andrej Valek
c15e506a46 cve_check: convert CVE_CHECK_IGNORE to CVE_STATUS
- Try to add convert and apply statuses for old CVEs
- Drop some obsolete ignores, while they are not relevant for current
  version

(From OE-Core rev: 1634ed4048cf56788cd5c2c1bdc979b70afcdcd7)

Signed-off-by: Andrej Valek <andrej.valek@siemens.com>
Reviewed-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-07-21 11:52:26 +01:00
Ross Burton
2ff5c043d7 linux-yocto/cve-exclusion: move entries from cve-extra-exclusions
We've a slew of CVE_CHECK_IGNOREs in cve-extra-exclusions which are to
mark a CVE as not valid with the current default kernel. However, this
file is kernel agnostic so if someone decides to build a 6.0 kernel then
these ignores are no longer valid.

Move the ignores which are to simply reflect backports to
cve-exclusions_6.1.inc so that they're version-specific. As the kernel
is upgraded these exclusions should be made redundant and removed from
the file.

(From OE-Core rev: 157f7b62e271df5dfd8a3bc4d3821bf806fde51e)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-07-10 11:36:34 +01:00
Ross Burton
37382c45ea cve-extra-exclusions: CVE-2023-3141 was backported in Linux 6.1.30
(From OE-Core rev: 845e5fa021f5e5addeee4f4f7a035dcc62742cf1)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-06-20 23:24:26 +01:00
Ross Burton
229813a628 cve-extra-exclusions: call out an Ubuntu-specific issue explicitly
(From OE-Core rev: 8e8157926f3b20f3308db0a951a94f58e7ede1f5)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-06-20 23:24:26 +01:00
Ross Burton
d9cf8973d0 cve-extra-exclusions: remove 2019 blanket ignores
Remove the blanket ignore and handle the CVEs individually.

CVE-2019-14899 is related to network interface configuration across
multiple operating systems, so leave this as unresolved.

-3016, -3819 and -3887 are pending CPE updates, so ignore them.

The others have accurate CPE information now so are handled correctly.

(From OE-Core rev: e46bd62a278ec0bb9da995cab9350f1c363131d1)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-06-13 22:16:31 +01:00
Ross Burton
52edee5ad3 cve-extra-exclusions: add more ignores for 2023 kernel CVEs
All of these CVEs have been fixed in the kernel point release that we
currently ship, so ignore them.

(From OE-Core rev: 86aee302673146dca10f313d0c70b69d6c4bdc7d)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-06-13 22:16:31 +01:00
Ross Burton
6e6fdfd542 cve-extra-exclusions: add more linux-yocto CVE ignores
These CVEs have all been fixed <6.1.30, which is the default linux-yocto
kernel version.

(From OE-Core rev: 73f03970f0aadfb053666a1e93f6f6d5b5156ca6)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-06-06 23:41:13 +01:00
Yoann Congal
8fba302211 cve-extra-exclusions: linux-yocto: ignore fixed CVE-2023-1652 & CVE-2023-1829
CVE-2023-1652 & CVE-2023-1829 are fixed by all version used by
linux-yocto.

Fixing commits are not referenced by NVD but are referenced by:
* https://www.linuxkernelcves.com
* Debian kernel-sec team
... this should be trust worthy enough.

(From OE-Core rev: 8f9d6c5b0238641313387c139442566752a1d25d)

Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-04-27 14:41:31 +01:00
Richard Purdie
f79046d082 cve-exclusions: Document some further linux-yocto CVE statuses
Add some information about some further kernel CVEs which don't apply for
either linux-yocto or don't apply for linux-yocto 6.1.

(From OE-Core rev: 85c1713bf0c01c68558bfba38edcc005c1ebb1c9)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-04-11 11:48:04 +01:00
Yoann Congal
8bda92936b cve-extra-exclusion: ignore disputed CVE-2023-23005
(From OE-Core rev: 39274240b7756f498507b229d5f3461c207f1823)

Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
Reviewed-by: Frank WOLFF <frank.wolff@smile.fr>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-04-07 15:24:02 +01:00
Yoann Congal
33e23d4992 cve-extra-exclusions: ignore inapplicable linux-yocto CVEs
CVEs CVE-2023-0179, CVE-2023-1079 and CVE-2023-1513 are patched in our
kernels but appear as active because the NVD database is not up to date.

(From OE-Core rev: ae1e7999a06c56c6f752413296b8f6b505475f8b)

Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
Reviewed-by: Frank WOLFF <frank.wolff@smile.fr>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-04-06 14:32:20 +01:00
Geoffrey GIRY
b8bfd3b01b cve-extra-exclusions: ignore inapplicable linux-yocto CVEs
Multiple CVEs are patched in kernel but appear as active because the NVD
database is not up to date.

In common file cve-extra-exclusion.inc, CVEs are ignored if and only if
all versions of kernel used are patched.

In cve-exclusion_6.1.inc, only ignore CVEs that are patched in v6.1,
and not patched in v5.15.
Recipes of version 6.1 should include this file.

Reviewed-by: Yoann Congal <yoann.congal@smile.fr>
(From OE-Core rev: 5feb065f1b1aaf218f71cc9d31a9251b139b9442)

Signed-off-by: Geoffrey GIRY <geoffrey.giry@smile.fr>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-04-05 17:26:11 +01:00
Richard Purdie
9b070654f8 cve-extra-exclusions.inc: Exclude some issues not present in linux-yocto
Exclude some CVEs where the patches were backported to the stable series
kernels we have.

https://www.linuxkernelcves.com/cves/CVE-XXXX-XXXX is useful to help
with this.

Reviewed-by: Yoann Congal <yoann.congal@smile.fr>
(From OE-Core rev: 33448393493d507c4d81c40e43537065a7b61d4c)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-04-04 21:55:21 +01:00
Geoffrey GIRY
6bdd652fb6 cve-extra-exclusions: ignore inapplicable linux-yocto CVEs
Multiple CVE are patched in kernel but appears as active because the NVD
database is not up to date.

CVE are ignored if and only if all versions of kernel used by master are patched.

Also ignore CVEs with wrong CPE (applied to kernel but actually are for
 another package)

(From OE-Core rev: 92770a08c04a6c1eb351231d937b16e76558f013)

Signed-off-by: Geoffrey GIRY <geoffrey.giry@smile.fr>
Reviewed-by: Yoann Congal <yoann.congal@smile.fr>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-02-28 07:53:54 +00:00
Richard Purdie
b10ba003c8 cve-extra-exclusions: Clean up and ignore three CVEs (2xqemu and nasm)
Remove obsolete comments/data from the file. Add in three CVEs to ignore.
Two are qemu CVEs which upstream aren't particularly intersted in and aren't
serious issues. Also ignore the nasm CVE found from fuzzing as this isn't
a issue we'd expose from OE.

(From OE-Core rev: 68291026aab2fa6ee1260ca95198dd1d568521e5)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-06-30 16:34:36 +01:00
Richard Purdie
99473ca0cb cve-extra-exclusions: Add kernel CVEs
For OE-Core our policy is to stay as close to the kernel stable releases
as we can. This should ensure the bulk of the major kernel CVEs are fixed
and we don't dive into each individual issue as the stable maintainers are
much more able to do that.

Rather than just ignore all kernel CVEs which is what we have been doing,
list the ones we ignore on this basis here, allowing new issues to be
visible. If anyone wishes to clean up CPE entries with NIST for these, we'd
welcome than and then entries can likely be removed from here.

(From OE-Core rev: 319d465d44328b5f062d2da0526c0e8b189b4239)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-05-27 23:50:48 +01:00
Saul Wold
d9e500f83d meta/scripts: Improve internal variable naming
Update internal variable names to improve the terms used.

(From OE-Core rev: f408068e5d7998ae165f3002e51bc54b380b8099)

Signed-off-by: Saul Wold <saul.wold@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-03-10 08:00:28 +00:00
Richard Purdie
71ef319193 meta/scripts: Automated conversion of OE renamed variables
(From OE-Core rev: aa52af4518604b5bf13f3c5e885113bf868d6c81)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-02-21 23:37:27 +00:00
Steve Sakoman
26c83bbcc6 cve-extra-exclusions: add db CVEs to exclusion list
Since Oracle relicensed bdb, the open source community is slowly but surely replacing bdb with
supported and open source friendly alternatives. As a result these CVEs are unlikely to ever be fixed.

(From OE-Core rev: 679fc70f907fb221f4541ebf30c1610e937209b7)

Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2021-12-08 20:22:11 +00:00
Richard Purdie
8632de2d7a flex: Add CVE-2019-6293 to exclusions for checks
CVE is effectively disputed - yes there is stack exhaustion but no bug and it
is building the parser, not running it, effectively similar to a compiler ICE.
Upstream no plans to address and there is no security issue.

https://github.com/westes/flex/issues/414

(From OE-Core rev: 0cae5d7a24bedf6784781b62cbb3795a44bab4d1)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2021-09-07 21:54:11 +01:00
Richard Purdie
ba333719d6 cve-extra-exclusions.inc: Clean up merged CPE updates
(From OE-Core rev: d2ba6d58e77430cceeca9db61fdb06882a92e1e7)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2021-05-21 15:18:23 +01:00
Richard Purdie
8893cd87f3 cve-extra-exclusions: Fix typos
(From OE-Core rev: d4d4644e7c127e8b88b180635124e8afc905c69e)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2021-05-20 18:14:47 +01:00
Richard Purdie
1376f22693 cve-extra-exclusions.inc: add exclusion list for intractable CVE's
The preferred methods for CVE resolution are:

1. Version upgrades where possible
2. Patches where not possible
3. Database updates where version info is incorrect
4. Exclusion from checking where it is determined that the CVE
   does not apply to our environment

In some cases none of these methods are possible. For example the
CVE may be decades old with no apparent resolution, and with broken
links that make further research impractical. Some CVEs are vauge
with no specific action the project can take too.

This patch creates a mechanism for users to remove this type of
CVE from the cve-check results via an optional include file.

Based on an initial patch from Steve Sakoman <steve@sakoman.com>
but extended heavily by RP.

(From OE-Core rev: cf282ae03db3f09df42dcd110d7086c2d854642c)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2021-05-20 12:30:32 +01:00