On 9/11/20 12:37 AM, Lee Chee Yang wrote: > From: Lee Chee Yang <chee.yang....@intel.com> > > use safelist instead of whitelist. Thanks for sending the patch. There is some unfinished conclusions for renaming various variables to be more inclusive. I am personally fine with this word choice.
Is this what other open source projects are rename to ? So would "blacklist" become "unsafelist" Do you have an idea if other layers would be affected by this change? -armin > Replace CVE_CHECK_PN_WHITELIST with CVE_CHECK_PN_SAFELIST. > Replace CVE_CHECK_WHITELIST with CVE_CHECK_SAFELIST. > > Signed-off-by: Lee Chee Yang <chee.yang....@intel.com> > --- > meta/classes/cve-check.bbclass | 47 ++++++++++--------- > .../openssl/openssl_1.1.1g.bb | 2 +- > meta/recipes-core/glibc/glibc_2.32.bb | 2 +- > meta/recipes-devtools/cmake/cmake.inc | 2 +- > meta/recipes-devtools/python/python3_3.8.5.bb | 2 +- > meta/recipes-devtools/rsync/rsync_3.2.3.bb | 2 +- > .../iputils/iputils_s20200821.bb | 2 +- > meta/recipes-extended/procps/procps_3.3.16.bb | 2 +- > .../libpng/libpng_1.6.37.bb | 2 +- > .../libsndfile/libsndfile1_1.0.28.bb | 2 +- > meta/recipes-support/lz4/lz4_1.9.2.bb | 2 +- > meta/recipes-support/sqlite/sqlite3_3.33.0.bb | 2 +- > 12 files changed, 35 insertions(+), 34 deletions(-) > > diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass > index 17f64a8a9c..82b2b40da0 100644 > --- a/meta/classes/cve-check.bbclass > +++ b/meta/classes/cve-check.bbclass > @@ -40,15 +40,15 @@ CVE_CHECK_MANIFEST ?= > "${DEPLOY_DIR_IMAGE}/${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.cve > CVE_CHECK_COPY_FILES ??= "1" > CVE_CHECK_CREATE_MANIFEST ??= "1" > > -# Whitelist for packages (PN) > -CVE_CHECK_PN_WHITELIST ?= "" > +# Safelist for packages (PN) > +CVE_CHECK_PN_SAFELIST ?= "" > > -# Whitelist for CVE. If a CVE is found, then it is considered patched. > +# Safelist for CVE. If a CVE is found, then it is considered patched. > # The value is a string containing space separated CVE values: > -# > -# CVE_CHECK_WHITELIST = 'CVE-2014-2524 CVE-2018-1234' > -# > -CVE_CHECK_WHITELIST ?= "" > +# > +# CVE_CHECK_SAFELIST = 'CVE-2014-2524 CVE-2018-1234' > +# > +CVE_CHECK_SAFELIST ?= "" > > python cve_save_summary_handler () { > import shutil > @@ -87,10 +87,10 @@ python do_cve_check () { > patched_cves = get_patches_cves(d) > except FileNotFoundError: > bb.fatal("Failure in searching patches") > - whitelisted, patched, unpatched = check_cves(d, patched_cves) > + safelisted, patched, unpatched = check_cves(d, patched_cves) > if patched or unpatched: > cve_data = get_cve_info(d, patched + unpatched) > - cve_write_data(d, patched, unpatched, whitelisted, cve_data) > + cve_write_data(d, patched, unpatched, safelisted, cve_data) > else: > bb.note("No CVE database found, skipping CVE check") > > @@ -213,15 +213,16 @@ def check_cves(d, patched_cves): > return ([], [], []) > pv = d.getVar("CVE_VERSION").split("+git")[0] > > - # If the recipe has been whitlisted we return empty lists > - if d.getVar("PN") in d.getVar("CVE_CHECK_PN_WHITELIST").split(): > - bb.note("Recipe has been whitelisted, skipping check") > + if d.getVar("CVE_CHECK_PN_WHITELIST"): > + bb.warn("CVE_CHECK_PN_WHITELIST is deprecated, please use > CVE_CHECK_PN_SAFELIST.") > + # If the recipe has been safelisted we return empty lists > + if d.getVar("PN") in d.getVar("CVE_CHECK_PN_SAFELIST").split(): > + bb.note("Recipe has been safelisted, skipping check") > return ([], [], []) > > - old_cve_whitelist = d.getVar("CVE_CHECK_CVE_WHITELIST") > - if old_cve_whitelist: > - bb.warn("CVE_CHECK_CVE_WHITELIST is deprecated, please use > CVE_CHECK_WHITELIST.") > - cve_whitelist = d.getVar("CVE_CHECK_WHITELIST").split() > + if d.getVar("CVE_CHECK_CVE_WHITELIST") or > d.getVar("CVE_CHECK_WHITELIST"): > + bb.warn("CVE_CHECK_CVE_WHITELIST and CVE_CHECK_WHITELIST is > deprecated, please use CVE_CHECK_SAFELIST.") > + cve_safelist = d.getVar("CVE_CHECK_SAFELIST").split() > > import sqlite3 > db_file = d.expand("file:${CVE_CHECK_DB_FILE}?mode=ro") > @@ -238,9 +239,9 @@ def check_cves(d, patched_cves): > for cverow in conn.execute("SELECT DISTINCT ID FROM PRODUCTS WHERE > PRODUCT IS ? AND VENDOR LIKE ?", (product, vendor)): > cve = cverow[0] > > - if cve in cve_whitelist: > - bb.note("%s-%s has been whitelisted for %s" % (product, pv, > cve)) > - # TODO: this should be in the report as 'whitelisted' > + if cve in cve_safelist: > + bb.note("%s-%s has been safelisted for %s" % (product, pv, > cve)) > + # TODO: this should be in the report as 'safelisted' > patched_cves.add(cve) > continue > elif cve in patched_cves: > @@ -294,7 +295,7 @@ def check_cves(d, patched_cves): > > conn.close() > > - return (list(cve_whitelist), list(patched_cves), cves_unpatched) > + return (list(cve_safelist), list(patched_cves), cves_unpatched) > > def get_cve_info(d, cves): > """ > @@ -318,7 +319,7 @@ def get_cve_info(d, cves): > conn.close() > return cve_data > > -def cve_write_data(d, patched, unpatched, whitelisted, cve_data): > +def cve_write_data(d, patched, unpatched, safelisted, cve_data): > """ > Write CVE information in WORKDIR; and to CVE_CHECK_DIR, and > CVE manifest if enabled. > @@ -334,8 +335,8 @@ def cve_write_data(d, patched, unpatched, whitelisted, > cve_data): > write_string += "PACKAGE NAME: %s\n" % d.getVar("PN") > write_string += "PACKAGE VERSION: %s%s\n" % (d.getVar("EXTENDPE"), > d.getVar("PV")) > write_string += "CVE: %s\n" % cve > - if cve in whitelisted: > - write_string += "CVE STATUS: Whitelisted\n" > + if cve in safelisted: > + write_string += "CVE STATUS: Safelisted\n" > elif cve in patched: > write_string += "CVE STATUS: Patched\n" > else: > diff --git a/meta/recipes-connectivity/openssl/openssl_1.1.1g.bb > b/meta/recipes-connectivity/openssl/openssl_1.1.1g.bb > index 815955837b..c74538fa99 100644 > --- a/meta/recipes-connectivity/openssl/openssl_1.1.1g.bb > +++ b/meta/recipes-connectivity/openssl/openssl_1.1.1g.bb > @@ -212,4 +212,4 @@ CVE_PRODUCT = "openssl:openssl" > > # Only affects OpenSSL >= 1.1.1 in combination with Apache < 2.4.37 > # Apache in meta-webserver is already recent enough > -CVE_CHECK_WHITELIST += "CVE-2019-0190" > +CVE_CHECK_SAFELIST += "CVE-2019-0190" > diff --git a/meta/recipes-core/glibc/glibc_2.32.bb > b/meta/recipes-core/glibc/glibc_2.32.bb > index 7049e61625..9e29904e85 100644 > --- a/meta/recipes-core/glibc/glibc_2.32.bb > +++ b/meta/recipes-core/glibc/glibc_2.32.bb > @@ -1,7 +1,7 @@ > require glibc.inc > require glibc-version.inc > > -CVE_CHECK_WHITELIST += "CVE-2020-10029" > +CVE_CHECK_SAFELIST += "CVE-2020-10029" > > DEPENDS += "gperf-native bison-native make-native" > > diff --git a/meta/recipes-devtools/cmake/cmake.inc > b/meta/recipes-devtools/cmake/cmake.inc > index fa1b818ae4..418845a597 100644 > --- a/meta/recipes-devtools/cmake/cmake.inc > +++ b/meta/recipes-devtools/cmake/cmake.inc > @@ -28,4 +28,4 @@ UPSTREAM_CHECK_REGEX = "cmake-(?P<pver>\d+(\.\d+)+)\.tar" > > # This is specific to the npm package that installs cmake, so isn't > # relevant to OpenEmbedded > -CVE_CHECK_WHITELIST += "CVE-2016-10642" > +CVE_CHECK_SAFELIST += "CVE-2016-10642" > diff --git a/meta/recipes-devtools/python/python3_3.8.5.bb > b/meta/recipes-devtools/python/python3_3.8.5.bb > index cabe5dc075..edbfc634ab 100644 > --- a/meta/recipes-devtools/python/python3_3.8.5.bb > +++ b/meta/recipes-devtools/python/python3_3.8.5.bb > @@ -49,7 +49,7 @@ UPSTREAM_CHECK_REGEX = "[Pp]ython-(?P<pver>\d+(\.\d+)+).tar" > CVE_PRODUCT = "python" > > # This is not exploitable when glibc has CVE-2016-10739 fixed. > -CVE_CHECK_WHITELIST += "CVE-2019-18348" > +CVE_CHECK_SAFELIST += "CVE-2019-18348" > > PYTHON_MAJMIN = "3.8" > > diff --git a/meta/recipes-devtools/rsync/rsync_3.2.3.bb > b/meta/recipes-devtools/rsync/rsync_3.2.3.bb > index 375efa0dea..1e52c48b5d 100644 > --- a/meta/recipes-devtools/rsync/rsync_3.2.3.bb > +++ b/meta/recipes-devtools/rsync/rsync_3.2.3.bb > @@ -17,7 +17,7 @@ SRC_URI = > "https://download.samba.org/pub/${BPN}/src/${BP}.tar.gz \ > SRC_URI[sha256sum] = > "becc3c504ceea499f4167a260040ccf4d9f2ef9499ad5683c179a697146ce50e" > > # -16548 required for v3.1.3pre1. Already in v3.1.3. > -CVE_CHECK_WHITELIST += " CVE-2017-16548 " > +CVE_CHECK_SAFELIST += " CVE-2017-16548 " > > inherit autotools-brokensep > > diff --git a/meta/recipes-extended/iputils/iputils_s20200821.bb > b/meta/recipes-extended/iputils/iputils_s20200821.bb > index 28dd194a12..073af6777c 100644 > --- a/meta/recipes-extended/iputils/iputils_s20200821.bb > +++ b/meta/recipes-extended/iputils/iputils_s20200821.bb > @@ -21,7 +21,7 @@ UPSTREAM_CHECK_GITTAGREGEX = "(?P<pver>s\d+)" > > # Fixed in 2000-10-10, but the versioning of iputils > # breaks the version order. > -CVE_CHECK_WHITELIST += "CVE-2000-1213 CVE-2000-1214" > +CVE_CHECK_SAFELIST += "CVE-2000-1213 CVE-2000-1214" > > PACKAGECONFIG ??= "libcap rarpd \ > ${@bb.utils.contains('DISTRO_FEATURES', 'ipv6', 'ninfod > traceroute6', '', d)} \ > diff --git a/meta/recipes-extended/procps/procps_3.3.16.bb > b/meta/recipes-extended/procps/procps_3.3.16.bb > index 2810ebd285..d0d7195e17 100644 > --- a/meta/recipes-extended/procps/procps_3.3.16.bb > +++ b/meta/recipes-extended/procps/procps_3.3.16.bb > @@ -73,4 +73,4 @@ python __anonymous() { > > # 'ps' isn't suitable for use as a security tool so whitelist this CVE. > # https://bugzilla.redhat.com/show_bug.cgi?id=1575473#c3 > -CVE_CHECK_WHITELIST += "CVE-2018-1121" > +CVE_CHECK_SAFELIST += "CVE-2018-1121" > diff --git a/meta/recipes-multimedia/libpng/libpng_1.6.37.bb > b/meta/recipes-multimedia/libpng/libpng_1.6.37.bb > index 8c53d11642..ac1901f5a4 100644 > --- a/meta/recipes-multimedia/libpng/libpng_1.6.37.bb > +++ b/meta/recipes-multimedia/libpng/libpng_1.6.37.bb > @@ -29,4 +29,4 @@ FILES_${PN}-tools = "${bindir}/png-fix-itxt > ${bindir}/pngfix ${bindir}/pngcp" > BBCLASSEXTEND = "native nativesdk" > > # CVE-2019-17371 is actually a memory leak in gif2png 2.x > -CVE_CHECK_WHITELIST += "CVE-2019-17371" > +CVE_CHECK_SAFELIST += "CVE-2019-17371" > diff --git a/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb > b/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb > index b100108766..7e32d0e3f6 100644 > --- a/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb > +++ b/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb > @@ -40,4 +40,4 @@ do_install_append() { > > # This can't be replicated and is just a memory leak. > # https://github.com/erikd/libsndfile/issues/398 > -CVE_CHECK_WHITELIST += "CVE-2018-13419" > +CVE_CHECK_SAFELIST += "CVE-2018-13419" > diff --git a/meta/recipes-support/lz4/lz4_1.9.2.bb > b/meta/recipes-support/lz4/lz4_1.9.2.bb > index 6510156ed0..a9adb174b9 100644 > --- a/meta/recipes-support/lz4/lz4_1.9.2.bb > +++ b/meta/recipes-support/lz4/lz4_1.9.2.bb > @@ -19,7 +19,7 @@ UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>.*)" > S = "${WORKDIR}/git" > > # Fixed in r118, which is larger than the current version. > -CVE_CHECK_WHITELIST += "CVE-2014-4715" > +CVE_CHECK_SAFELIST += "CVE-2014-4715" > > EXTRA_OEMAKE = "PREFIX=${prefix} CC='${CC}' DESTDIR=${D} LIBDIR=${libdir} > INCLUDEDIR=${includedir} BUILD_STATIC=no" > > diff --git a/meta/recipes-support/sqlite/sqlite3_3.33.0.bb > b/meta/recipes-support/sqlite/sqlite3_3.33.0.bb > index 611a1bd923..097d7ec0d9 100644 > --- a/meta/recipes-support/sqlite/sqlite3_3.33.0.bb > +++ b/meta/recipes-support/sqlite/sqlite3_3.33.0.bb > @@ -7,4 +7,4 @@ SRC_URI = > "http://www.sqlite.org/2020/sqlite-autoconf-${SQLITE_PV}.tar.gz" > SRC_URI[sha256sum] = > "106a2c48c7f75a298a7557bcc0d5f4f454e5b43811cc738b7ca294d6956bbb15" > > # -19242 is only an issue in specific development branch commits > -CVE_CHECK_WHITELIST += "CVE-2019-19242" > +CVE_CHECK_SAFELIST += "CVE-2019-19242" > >
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#142444): https://lists.openembedded.org/g/openembedded-core/message/142444 Mute This Topic: https://lists.openembedded.org/mt/76774981/21656 Group Owner: openembedded-core+ow...@lists.openembedded.org Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-