From patchwork Wed Apr 21 20:42:35 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Matt Weber X-Patchwork-Id: 1468870 Return-Path: X-Original-To: incoming-buildroot@patchwork.ozlabs.org Delivered-To: patchwork-incoming-buildroot@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=busybox.net (client-ip=2605:bc80:3010::138; helo=smtp1.osuosl.org; envelope-from=buildroot-bounces@busybox.net; receiver=) Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=rockwellcollins.com header.i=@rockwellcollins.com header.a=rsa-sha256 header.s=hrcrc2020 header.b=FK1/Cv2m; dkim-atps=neutral Received: from smtp1.osuosl.org (smtp1.osuosl.org [IPv6:2605:bc80:3010::138]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4FQXbc0TYsz9sVq for ; Thu, 22 Apr 2021 06:44:27 +1000 (AEST) Received: from localhost (localhost [127.0.0.1]) by smtp1.osuosl.org (Postfix) with ESMTP id 893418333E; Wed, 21 Apr 2021 20:44:25 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp1.osuosl.org ([127.0.0.1]) by localhost (smtp1.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id igJ3ZLzwM8x2; Wed, 21 Apr 2021 20:44:24 +0000 (UTC) Received: from ash.osuosl.org (ash.osuosl.org [140.211.166.34]) by smtp1.osuosl.org (Postfix) with ESMTP id ED76582F8A; Wed, 21 Apr 2021 20:44:23 +0000 (UTC) X-Original-To: buildroot@lists.busybox.net Delivered-To: buildroot@osuosl.org Received: from smtp2.osuosl.org (smtp2.osuosl.org [140.211.166.133]) by ash.osuosl.org (Postfix) with ESMTP id D9D931BF46D for ; Wed, 21 Apr 2021 20:42:42 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp2.osuosl.org (Postfix) with ESMTP id C791A4036E for ; Wed, 21 Apr 2021 20:42:41 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Authentication-Results: smtp2.osuosl.org (amavisd-new); dkim=pass (2048-bit key) header.d=rockwellcollins.com Received: from smtp2.osuosl.org ([127.0.0.1]) by localhost (smtp2.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uhD0U5FTp2ma for ; Wed, 21 Apr 2021 20:42:41 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.8.0 Received: from secvs04.rockwellcollins.com (secvs04.rockwellcollins.com [205.175.225.130]) by smtp2.osuosl.org (Postfix) with ESMTPS id E465D40399 for ; Wed, 21 Apr 2021 20:42:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rockwellcollins.com; s=hrcrc2020; h=from:to:cc:subject:date:message-id:in-reply-to: references; bh=8MzYAaoYyUugQICkadsMLLXW9oFUs/LROsTmczfdOUQ=; b=FK1/Cv2mnbMvNmHAjD2ucBhcViK4AMR1JYwcp5yo1rqISLgwKvlRD2uA bew494+spqzsTS0DvzylMHnHXZR755pWv9KcQnsTxXvsd6m3BM/6JDJI5 8onDzBWy23SxvXx7WztIXRT9cKwxQhxndii6WLxCl6tGYxUEneISiuk1B deBwXiG55HGcOtkRnrtaAmYzQqB1g/jpRpQCET3z9oQypUyjqcPY1HUUT o8U050jt8QJ2GBHN/3vMRrj9omswpCgTGmPF4g4ha3jUnE6mIlXHYU3UP yO0iAEGPQlQRdhAkLL0j0iPMIONaPkxZM+69ROXaOX3PvF+gnC1cJHdwM A==; IronPort-SDR: 12U4NXCbw3DhZ4demsg+9juGTe5AdUNN00R6zwgBCWKRa18vpwH8PthQ8E3NV/EmLW6THFzuGF HrjnkowMDRS89MLUqjSBMMgVbxz1CzRB9Im/gyfoJ2I3lUMTTz8WcOvp4nKYpRibi/rBz0E8qk pAOqA+Lk+wxRkhZR2WZzGXrnEjdmufpe+MV4ijdEIGAIBDanIh8wm+H+pdnjDpIfIQZIUVNE9X 602ZpPfly7YDQhi5Htr3M76kAseLcny4qIJcKNQpEfTFeArA2+lTtAecBBHaIZ+RAoX2xok3B7 vO0= Received: from ofwgwc03.rockwellcollins.com (HELO crulimr02.rockwellcollins.com) ([205.175.225.12]) by secvs04.rockwellcollins.com with ESMTP; 21 Apr 2021 15:42:37 -0500 X-Received: from biscuits.rockwellcollins.com (biscuits.rockwellcollins.lab [10.148.119.137]) by crulimr02.rockwellcollins.com (Postfix) with ESMTP id 84805608DA; Wed, 21 Apr 2021 15:42:37 -0500 (CDT) From: Matt Weber To: buildroot@buildroot.org Date: Wed, 21 Apr 2021 15:42:35 -0500 Message-Id: <20210421204235.5956-11-matthew.weber@rockwellcollins.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210421204235.5956-1-matthew.weber@rockwellcollins.com> References: <20210421204235.5956-1-matthew.weber@rockwellcollins.com> Subject: [Buildroot] [PATCH 10/10] package/tar: ignore CVE-2007-4476 X-BeenThere: buildroot@busybox.net X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussion and development of buildroot List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Matt Weber MIME-Version: 1.0 Errors-To: buildroot-bounces@busybox.net Sender: "buildroot" https://security-tracker.debian.org/tracker/CVE-2007-4476 Currently NVD has this incorrectly tagged for all versions. The bug trackers on different distros show it was generally fixed in versions >= 1.16 but because the impacted source code is in the GNU paxutils, it is hard to follow in what cases tar has been fixed around that 1.16 version. https://bugs.gentoo.org/196978 https://www.itsecdb.com/oval/definition/oval/org.mitre.oval/def/9336/Buffer-overflow-in-the-safer-name-suffix-function-in-GNU-tar.html Signed-off-by: Matthew Weber --- package/tar/tar.mk | 2 ++ 1 file changed, 2 insertions(+) diff --git a/package/tar/tar.mk b/package/tar/tar.mk index 690a5952ba..80d7495b00 100644 --- a/package/tar/tar.mk +++ b/package/tar/tar.mk @@ -13,6 +13,8 @@ TAR_CONF_OPTS = --exec-prefix=/ TAR_LICENSE = GPL-3.0+ TAR_LICENSE_FILES = COPYING TAR_CPE_ID_VENDOR = gnu +# only tar <= 1.16 +TAR_IGNORE_CVES += CVE-2007-4476 ifeq ($(BR2_PACKAGE_ACL),y) TAR_DEPENDENCIES += acl