summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPeter Marko <peter.marko@siemens.com>2024-11-08 22:06:00 +0100
committerArmin Kuster <akuster808@gmail.com>2024-12-08 14:38:16 -0500
commit82a9ac867d2f661b77435e13842ab42a63a352ac (patch)
tree2e74c7be1609bc6c559e914e4ae0b685c4aee7d4
parentb126eb370512f8a3de06f6aebe8913c532d21dbe (diff)
downloadmeta-openembedded-82a9ac867d2f661b77435e13842ab42a63a352ac.tar.gz
squid: conditionally set status of CVE-2024-45802
According to [1] the ESI feature implementation in squid is vulnerable without any fix available. NVD says it's fixed in 6.10, however the change in this release only disables ESI by default (which we always did via PACKAGECONFIG). Commit in master branch related to this CVE is [2]. Title is "Remove Edge Side Include (ESI) protocol" and it's also what it does. So there will never be a fix for these ESI vulnerabilities. We should not break features in LTS branch and cannot fix this problem. So ignrore this CVE based on set PACKAGECONFIG which should remove it from reports for most users. Thos who need ESI need to assess the risk themselves. [1] https://github.com/squid-cache/squid/security/advisories/GHSA-f975-v7qw-q7hj [2] https://github.com/squid-cache/squid/commit/5eb89ef3d828caa5fc43cd8064f958010dbc8158 Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
-rw-r--r--meta-networking/recipes-daemons/squid/squid_4.15.bb3
1 files changed, 3 insertions, 0 deletions
diff --git a/meta-networking/recipes-daemons/squid/squid_4.15.bb b/meta-networking/recipes-daemons/squid/squid_4.15.bb
index a042f57166..6a4ef0a2b6 100644
--- a/meta-networking/recipes-daemons/squid/squid_4.15.bb
+++ b/meta-networking/recipes-daemons/squid/squid_4.15.bb
@@ -123,3 +123,6 @@ FILES:${PN}-doc += "${datadir}/*.txt"
123 123
124RDEPENDS:${PN} += "perl" 124RDEPENDS:${PN} += "perl"
125RDEPENDS:${PN}-ptest += "make" 125RDEPENDS:${PN}-ptest += "make"
126
127# Only ESI feature is vulnerable
128CVE_CHECK_IGNORE += "${@'' if bb.utils.filter('PACKAGECONFIG', 'esi', d) else 'CVE-2024-45802'}"