Hi,

On 2/3/2021 3:38 PM, Steve Sakoman wrote:
On Wed, Feb 3, 2021 at 12:02 AM Mikko Rapeli <mikko.rap...@bmw.de> wrote:
Hi,

On Wed, Feb 03, 2021 at 08:42:57AM +0000, Anatol Belski wrote:
The naming convention needs to be help so the CVE is recognized as
fixed by the tooling.
Yocto CVE checker does detect CVE patches also from patch comments so
this change is not needed for that. This is sufficient:

poky$ git grep CVE-2020-35457
meta/recipes-core/glib-2.0/glib-2.0/0001-goption-Add-a-precondition-to-avoid-GOptionEntry-lis.patch:CVE:
 CVE-2020-35457
Yes, we are detecting the CVE patch from the patch comment.

However our CVE patch guidelines do request that the patch be named
with the CVE as the name:

https://wiki.yoctoproject.org/wiki/Security

(in the "Patch name convention and commit message" section)

I'm sorry I didn't catch this when I merged this earlier.  I always
check the patch itself for the CVE tag, but I missed the name.  So I'm
happy to take this patch just to clean up the metadata and make it
easy to see that this is a CVE patch.

Thanks for pointing this out. On my side, I also always check this one

https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines

There's no explicit mention on the filename, but I guess i sure read the other page, too. Perhaps the effort would be better put adding a word on the wiki, that the filename is not really relevant. And otherwise, seems there's nothing to fix other than my habit on seeing the filename to be same as CVE :)

Thanks!

Anatol

Steve

Is there some other tooling that you are referring to?

Cheers,

-Mikko


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#147631): 
https://lists.openembedded.org/g/openembedded-core/message/147631
Mute This Topic: https://lists.openembedded.org/mt/80349258/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to