From 98e1f972bd7bab87efbf7a4fec69d8b3324f9de3 Mon Sep 17 00:00:00 2001 From: Peter Marko Date: Fri, 8 Nov 2024 22:08:13 +0100 Subject: squid: conditionally set status of CVE-2024-45802 According to [1] the ESI feature implementation in squid is vulnerable without any fix available. NVD says it's fixed in 6.10, however the change in this release only disables ESI by default (which we always did via PACKAGECONFIG). Commit in master branch related to this CVE is [2]. Title is "Remove Edge Side Include (ESI) protocol" and it's also what it does. So there will never be a fix for these ESI vulnerabilities. We should not break features in LTS branch and cannot fix this problem. So ignrore this CVE based on set PACKAGECONFIG which should remove it from reports for most users. Thos who need ESI need to assess the risk themselves. [1] https://github.com/squid-cache/squid/security/advisories/GHSA-f975-v7qw-q7hj [2] https://github.com/squid-cache/squid/commit/5eb89ef3d828caa5fc43cd8064f958010dbc8158 Signed-off-by: Peter Marko Signed-off-by: Armin Kuster --- meta-networking/recipes-daemons/squid/squid_6.9.bb | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/meta-networking/recipes-daemons/squid/squid_6.9.bb b/meta-networking/recipes-daemons/squid/squid_6.9.bb index 61fc6027b3..f6312521d9 100644 --- a/meta-networking/recipes-daemons/squid/squid_6.9.bb +++ b/meta-networking/recipes-daemons/squid/squid_6.9.bb @@ -147,3 +147,9 @@ FILES:${PN}-networkmanager = "${libdir}/NetworkManager/dispatcher.d" RDEPENDS:${PN} += "perl ${PN}-conf" RDEPENDS:${PN}-ptest += "perl make bash" + +python() { + # Only ESI feature is vulnerable + if not bb.utils.filter('PACKAGECONFIG', 'esi', d): + d.setVarFlag("CVE_STATUS", "CVE-2024-45802", "not-applicable-config: esi is disabled") +} -- cgit v1.2.3-54-g00ecf