On 9/11/20 3:20 PM, akuster wrote: > > > On 9/11/20 12:37 AM, Lee Chee Yang wrote: >> From: Lee Chee Yang <chee.yang....@intel.com> >> >> use safelist instead of whitelist. > Thanks for sending the patch. There is some unfinished conclusions for > renaming various variables to be more inclusive. I am personally fine > with this word choice. > > Is this what other open source projects are rename to ? > > So would "blacklist" become "unsafelist"
I think, BLOCKLIST/ALLOWLIST would be better here. > > Do you have an idea if other layers would be affected by this change? > > -armin > > >> Replace CVE_CHECK_PN_WHITELIST with CVE_CHECK_PN_SAFELIST. >> Replace CVE_CHECK_WHITELIST with CVE_CHECK_SAFELIST. >> >> Signed-off-by: Lee Chee Yang <chee.yang....@intel.com> >> --- >> meta/classes/cve-check.bbclass | 47 ++++++++++--------- >> .../openssl/openssl_1.1.1g.bb | 2 +- >> meta/recipes-core/glibc/glibc_2.32.bb | 2 +- >> meta/recipes-devtools/cmake/cmake.inc | 2 +- >> meta/recipes-devtools/python/python3_3.8.5.bb | 2 +- >> meta/recipes-devtools/rsync/rsync_3.2.3.bb | 2 +- >> .../iputils/iputils_s20200821.bb | 2 +- >> meta/recipes-extended/procps/procps_3.3.16.bb | 2 +- >> .../libpng/libpng_1.6.37.bb | 2 +- >> .../libsndfile/libsndfile1_1.0.28.bb | 2 +- >> meta/recipes-support/lz4/lz4_1.9.2.bb | 2 +- >> meta/recipes-support/sqlite/sqlite3_3.33.0.bb | 2 +- >> 12 files changed, 35 insertions(+), 34 deletions(-) >> >> diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass >> index 17f64a8a9c..82b2b40da0 100644 >> --- a/meta/classes/cve-check.bbclass >> +++ b/meta/classes/cve-check.bbclass >> @@ -40,15 +40,15 @@ CVE_CHECK_MANIFEST ?= >> "${DEPLOY_DIR_IMAGE}/${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.cve >> CVE_CHECK_COPY_FILES ??= "1" >> CVE_CHECK_CREATE_MANIFEST ??= "1" >> >> -# Whitelist for packages (PN) >> -CVE_CHECK_PN_WHITELIST ?= "" >> +# Safelist for packages (PN) >> +CVE_CHECK_PN_SAFELIST ?= "" >> >> -# Whitelist for CVE. If a CVE is found, then it is considered patched. >> +# Safelist for CVE. If a CVE is found, then it is considered patched. >> # The value is a string containing space separated CVE values: >> -# >> -# CVE_CHECK_WHITELIST = 'CVE-2014-2524 CVE-2018-1234' >> -# >> -CVE_CHECK_WHITELIST ?= "" >> +# >> +# CVE_CHECK_SAFELIST = 'CVE-2014-2524 CVE-2018-1234' >> +# >> +CVE_CHECK_SAFELIST ?= "" >> >> python cve_save_summary_handler () { >> import shutil >> @@ -87,10 +87,10 @@ python do_cve_check () { >> patched_cves = get_patches_cves(d) >> except FileNotFoundError: >> bb.fatal("Failure in searching patches") >> - whitelisted, patched, unpatched = check_cves(d, patched_cves) >> + safelisted, patched, unpatched = check_cves(d, patched_cves) >> if patched or unpatched: >> cve_data = get_cve_info(d, patched + unpatched) >> - cve_write_data(d, patched, unpatched, whitelisted, cve_data) >> + cve_write_data(d, patched, unpatched, safelisted, cve_data) >> else: >> bb.note("No CVE database found, skipping CVE check") >> >> @@ -213,15 +213,16 @@ def check_cves(d, patched_cves): >> return ([], [], []) >> pv = d.getVar("CVE_VERSION").split("+git")[0] >> >> - # If the recipe has been whitlisted we return empty lists >> - if d.getVar("PN") in d.getVar("CVE_CHECK_PN_WHITELIST").split(): >> - bb.note("Recipe has been whitelisted, skipping check") >> + if d.getVar("CVE_CHECK_PN_WHITELIST"): >> + bb.warn("CVE_CHECK_PN_WHITELIST is deprecated, please use >> CVE_CHECK_PN_SAFELIST.") >> + # If the recipe has been safelisted we return empty lists >> + if d.getVar("PN") in d.getVar("CVE_CHECK_PN_SAFELIST").split(): >> + bb.note("Recipe has been safelisted, skipping check") >> return ([], [], []) >> >> - old_cve_whitelist = d.getVar("CVE_CHECK_CVE_WHITELIST") >> - if old_cve_whitelist: >> - bb.warn("CVE_CHECK_CVE_WHITELIST is deprecated, please use >> CVE_CHECK_WHITELIST.") >> - cve_whitelist = d.getVar("CVE_CHECK_WHITELIST").split() >> + if d.getVar("CVE_CHECK_CVE_WHITELIST") or >> d.getVar("CVE_CHECK_WHITELIST"): >> + bb.warn("CVE_CHECK_CVE_WHITELIST and CVE_CHECK_WHITELIST is >> deprecated, please use CVE_CHECK_SAFELIST.") >> + cve_safelist = d.getVar("CVE_CHECK_SAFELIST").split() >> >> import sqlite3 >> db_file = d.expand("file:${CVE_CHECK_DB_FILE}?mode=ro") >> @@ -238,9 +239,9 @@ def check_cves(d, patched_cves): >> for cverow in conn.execute("SELECT DISTINCT ID FROM PRODUCTS WHERE >> PRODUCT IS ? AND VENDOR LIKE ?", (product, vendor)): >> cve = cverow[0] >> >> - if cve in cve_whitelist: >> - bb.note("%s-%s has been whitelisted for %s" % (product, pv, >> cve)) >> - # TODO: this should be in the report as 'whitelisted' >> + if cve in cve_safelist: >> + bb.note("%s-%s has been safelisted for %s" % (product, pv, >> cve)) >> + # TODO: this should be in the report as 'safelisted' >> patched_cves.add(cve) >> continue >> elif cve in patched_cves: >> @@ -294,7 +295,7 @@ def check_cves(d, patched_cves): >> >> conn.close() >> >> - return (list(cve_whitelist), list(patched_cves), cves_unpatched) >> + return (list(cve_safelist), list(patched_cves), cves_unpatched) >> >> def get_cve_info(d, cves): >> """ >> @@ -318,7 +319,7 @@ def get_cve_info(d, cves): >> conn.close() >> return cve_data >> >> -def cve_write_data(d, patched, unpatched, whitelisted, cve_data): >> +def cve_write_data(d, patched, unpatched, safelisted, cve_data): >> """ >> Write CVE information in WORKDIR; and to CVE_CHECK_DIR, and >> CVE manifest if enabled. >> @@ -334,8 +335,8 @@ def cve_write_data(d, patched, unpatched, whitelisted, >> cve_data): >> write_string += "PACKAGE NAME: %s\n" % d.getVar("PN") >> write_string += "PACKAGE VERSION: %s%s\n" % (d.getVar("EXTENDPE"), >> d.getVar("PV")) >> write_string += "CVE: %s\n" % cve >> - if cve in whitelisted: >> - write_string += "CVE STATUS: Whitelisted\n" >> + if cve in safelisted: >> + write_string += "CVE STATUS: Safelisted\n" >> elif cve in patched: >> write_string += "CVE STATUS: Patched\n" >> else: >> diff --git a/meta/recipes-connectivity/openssl/openssl_1.1.1g.bb >> b/meta/recipes-connectivity/openssl/openssl_1.1.1g.bb >> index 815955837b..c74538fa99 100644 >> --- a/meta/recipes-connectivity/openssl/openssl_1.1.1g.bb >> +++ b/meta/recipes-connectivity/openssl/openssl_1.1.1g.bb >> @@ -212,4 +212,4 @@ CVE_PRODUCT = "openssl:openssl" >> >> # Only affects OpenSSL >= 1.1.1 in combination with Apache < 2.4.37 >> # Apache in meta-webserver is already recent enough >> -CVE_CHECK_WHITELIST += "CVE-2019-0190" >> +CVE_CHECK_SAFELIST += "CVE-2019-0190" >> diff --git a/meta/recipes-core/glibc/glibc_2.32.bb >> b/meta/recipes-core/glibc/glibc_2.32.bb >> index 7049e61625..9e29904e85 100644 >> --- a/meta/recipes-core/glibc/glibc_2.32.bb >> +++ b/meta/recipes-core/glibc/glibc_2.32.bb >> @@ -1,7 +1,7 @@ >> require glibc.inc >> require glibc-version.inc >> >> -CVE_CHECK_WHITELIST += "CVE-2020-10029" >> +CVE_CHECK_SAFELIST += "CVE-2020-10029" >> >> DEPENDS += "gperf-native bison-native make-native" >> >> diff --git a/meta/recipes-devtools/cmake/cmake.inc >> b/meta/recipes-devtools/cmake/cmake.inc >> index fa1b818ae4..418845a597 100644 >> --- a/meta/recipes-devtools/cmake/cmake.inc >> +++ b/meta/recipes-devtools/cmake/cmake.inc >> @@ -28,4 +28,4 @@ UPSTREAM_CHECK_REGEX = "cmake-(?P<pver>\d+(\.\d+)+)\.tar" >> >> # This is specific to the npm package that installs cmake, so isn't >> # relevant to OpenEmbedded >> -CVE_CHECK_WHITELIST += "CVE-2016-10642" >> +CVE_CHECK_SAFELIST += "CVE-2016-10642" >> diff --git a/meta/recipes-devtools/python/python3_3.8.5.bb >> b/meta/recipes-devtools/python/python3_3.8.5.bb >> index cabe5dc075..edbfc634ab 100644 >> --- a/meta/recipes-devtools/python/python3_3.8.5.bb >> +++ b/meta/recipes-devtools/python/python3_3.8.5.bb >> @@ -49,7 +49,7 @@ UPSTREAM_CHECK_REGEX = >> "[Pp]ython-(?P<pver>\d+(\.\d+)+).tar" >> CVE_PRODUCT = "python" >> >> # This is not exploitable when glibc has CVE-2016-10739 fixed. >> -CVE_CHECK_WHITELIST += "CVE-2019-18348" >> +CVE_CHECK_SAFELIST += "CVE-2019-18348" >> >> PYTHON_MAJMIN = "3.8" >> >> diff --git a/meta/recipes-devtools/rsync/rsync_3.2.3.bb >> b/meta/recipes-devtools/rsync/rsync_3.2.3.bb >> index 375efa0dea..1e52c48b5d 100644 >> --- a/meta/recipes-devtools/rsync/rsync_3.2.3.bb >> +++ b/meta/recipes-devtools/rsync/rsync_3.2.3.bb >> @@ -17,7 +17,7 @@ SRC_URI = >> "https://download.samba.org/pub/${BPN}/src/${BP}.tar.gz \ >> SRC_URI[sha256sum] = >> "becc3c504ceea499f4167a260040ccf4d9f2ef9499ad5683c179a697146ce50e" >> >> # -16548 required for v3.1.3pre1. Already in v3.1.3. >> -CVE_CHECK_WHITELIST += " CVE-2017-16548 " >> +CVE_CHECK_SAFELIST += " CVE-2017-16548 " >> >> inherit autotools-brokensep >> >> diff --git a/meta/recipes-extended/iputils/iputils_s20200821.bb >> b/meta/recipes-extended/iputils/iputils_s20200821.bb >> index 28dd194a12..073af6777c 100644 >> --- a/meta/recipes-extended/iputils/iputils_s20200821.bb >> +++ b/meta/recipes-extended/iputils/iputils_s20200821.bb >> @@ -21,7 +21,7 @@ UPSTREAM_CHECK_GITTAGREGEX = "(?P<pver>s\d+)" >> >> # Fixed in 2000-10-10, but the versioning of iputils >> # breaks the version order. >> -CVE_CHECK_WHITELIST += "CVE-2000-1213 CVE-2000-1214" >> +CVE_CHECK_SAFELIST += "CVE-2000-1213 CVE-2000-1214" >> >> PACKAGECONFIG ??= "libcap rarpd \ >> ${@bb.utils.contains('DISTRO_FEATURES', 'ipv6', 'ninfod >> traceroute6', '', d)} \ >> diff --git a/meta/recipes-extended/procps/procps_3.3.16.bb >> b/meta/recipes-extended/procps/procps_3.3.16.bb >> index 2810ebd285..d0d7195e17 100644 >> --- a/meta/recipes-extended/procps/procps_3.3.16.bb >> +++ b/meta/recipes-extended/procps/procps_3.3.16.bb >> @@ -73,4 +73,4 @@ python __anonymous() { >> >> # 'ps' isn't suitable for use as a security tool so whitelist this CVE. >> # https://bugzilla.redhat.com/show_bug.cgi?id=1575473#c3 >> -CVE_CHECK_WHITELIST += "CVE-2018-1121" >> +CVE_CHECK_SAFELIST += "CVE-2018-1121" >> diff --git a/meta/recipes-multimedia/libpng/libpng_1.6.37.bb >> b/meta/recipes-multimedia/libpng/libpng_1.6.37.bb >> index 8c53d11642..ac1901f5a4 100644 >> --- a/meta/recipes-multimedia/libpng/libpng_1.6.37.bb >> +++ b/meta/recipes-multimedia/libpng/libpng_1.6.37.bb >> @@ -29,4 +29,4 @@ FILES_${PN}-tools = "${bindir}/png-fix-itxt >> ${bindir}/pngfix ${bindir}/pngcp" >> BBCLASSEXTEND = "native nativesdk" >> >> # CVE-2019-17371 is actually a memory leak in gif2png 2.x >> -CVE_CHECK_WHITELIST += "CVE-2019-17371" >> +CVE_CHECK_SAFELIST += "CVE-2019-17371" >> diff --git a/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb >> b/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb >> index b100108766..7e32d0e3f6 100644 >> --- a/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb >> +++ b/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb >> @@ -40,4 +40,4 @@ do_install_append() { >> >> # This can't be replicated and is just a memory leak. >> # https://github.com/erikd/libsndfile/issues/398 >> -CVE_CHECK_WHITELIST += "CVE-2018-13419" >> +CVE_CHECK_SAFELIST += "CVE-2018-13419" >> diff --git a/meta/recipes-support/lz4/lz4_1.9.2.bb >> b/meta/recipes-support/lz4/lz4_1.9.2.bb >> index 6510156ed0..a9adb174b9 100644 >> --- a/meta/recipes-support/lz4/lz4_1.9.2.bb >> +++ b/meta/recipes-support/lz4/lz4_1.9.2.bb >> @@ -19,7 +19,7 @@ UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>.*)" >> S = "${WORKDIR}/git" >> >> # Fixed in r118, which is larger than the current version. >> -CVE_CHECK_WHITELIST += "CVE-2014-4715" >> +CVE_CHECK_SAFELIST += "CVE-2014-4715" >> >> EXTRA_OEMAKE = "PREFIX=${prefix} CC='${CC}' DESTDIR=${D} LIBDIR=${libdir} >> INCLUDEDIR=${includedir} BUILD_STATIC=no" >> >> diff --git a/meta/recipes-support/sqlite/sqlite3_3.33.0.bb >> b/meta/recipes-support/sqlite/sqlite3_3.33.0.bb >> index 611a1bd923..097d7ec0d9 100644 >> --- a/meta/recipes-support/sqlite/sqlite3_3.33.0.bb >> +++ b/meta/recipes-support/sqlite/sqlite3_3.33.0.bb >> @@ -7,4 +7,4 @@ SRC_URI = >> "http://www.sqlite.org/2020/sqlite-autoconf-${SQLITE_PV}.tar.gz" >> SRC_URI[sha256sum] = >> "106a2c48c7f75a298a7557bcc0d5f4f454e5b43811cc738b7ca294d6956bbb15" >> >> # -19242 is only an issue in specific development branch commits >> -CVE_CHECK_WHITELIST += "CVE-2019-19242" >> +CVE_CHECK_SAFELIST += "CVE-2019-19242" >> >> > > > > >
pEpkey.asc
Description: application/pgp-keys
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#142451): https://lists.openembedded.org/g/openembedded-core/message/142451 Mute This Topic: https://lists.openembedded.org/mt/76774981/21656 Group Owner: openembedded-core+ow...@lists.openembedded.org Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-