]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/commitdiff
cargo : non vulnerable cve-2022-46176 added to excluded list
authorSundeep KOKKONDA <sundeep.kokkonda@gmail.com>
Sun, 2 Apr 2023 15:28:36 +0000 (20:58 +0530)
committerSteve Sakoman <steve@sakoman.com>
Tue, 18 Apr 2023 13:55:32 +0000 (03:55 -1000)
This cve (https://nvd.nist.gov/vuln/detail/CVE-2022-46176) is a security vulnirability when using cargo ssh.
Kirkstone doesn't support rust on-target images and the bitbake using the 'wget' (which uses 'https') for fetching the sources instead of ssh.
So, cargo-native also not vulnerable to this cve and so added to excluded list.

Signed-off-by: Sundeep KOKKONDA <sundeep.kokkonda@windriver.com>
Acked-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/conf/distro/include/cve-extra-exclusions.inc

index 8b5f8d49b804303955e00b896f8e1d76e0cfdcb9..cb2d9204419f9e493ea687f217e48e2632ed3479 100644 (file)
 # the aim of sharing that work and ensuring we don't duplicate it.
 #
 
+#cargo https://nvd.nist.gov/vuln/detail/CVE-2022-46176
+#cargo security advisor https://blog.rust-lang.org/2023/01/10/cve-2022-46176.html
+#This CVE is a security issue when using cargo ssh. In kirkstone, rust 1.59.0 is used and the rust on-target is not supported, so the target images are not vulnerable to the cve.
+#The bitbake using the 'wget' (which uses 'https') for fetching the sources instead of ssh. So, the cargo-native are also not vulnerable to this cve and so added to excluded list.
+CVE_CHECK_IGNORE += "CVE-2022-46176"
 
 # strace https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0006
 # CVE is more than 20 years old with no resolution evident