On Mon, Sep 13, 2021 at 4:56 AM Steve Sakoman via
lists.openembedded.org <steve=sakoman....@lists.openembedded.org>
wrote:
>
> On Mon, Sep 13, 2021 at 2:45 AM Saloni Jain <jainsaloni0...@gmail.com> wrote:
> >
> > From: Saloni Jain <salo...@kpit.com>
> >
> > Below CVE affects only Oracle Berkeley DB as per upstream.
> > Hence, whitelisted them.
>
> I suspect that a cleaner solution might be to revert:
>
> db: update CVE_PRODUCT
> (https://git.openembedded.org/openembedded-core/commit/?id=ad799b109716ccd2f44dcf7a6a4cfcbd622ea661)
>
> which adds berkeley_db to CVE_PRODUCT
>
> I did a quick test and this eliminates all of the CVE's below. And of
> course it makes sense to only check for oracle_berkeley_db since that
> is the source code we are using.
>
> Also, this same issue is present in master, so any fix would need to
> go there first and I will cherry-pick.
>
> Could you confirm that this approach works for you too?

And for those who are wondering why the db CVE's don't show up in the
weekly reports, it is because the script that Ross provided me many
moons ago whitelisted db and db-native.

I figured he had a good reason for that, so I left it in for
consistency with the reports he had run :-)

db and db-native are the only whitelisted packages for those who might
be wondering.

Steve

> > 1. CVE-2015-2583
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-2583
> > 2. CVE-2015-2624
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-2624
> > 3. CVE-2015-2626
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-2626
> > 4. CVE-2015-2640
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-2640
> > 5. CVE-2015-2654
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-2654
> > 6. CVE-2015-2656
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-2656
> > 7. CVE-2015-4754
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4754
> > 8. CVE-2015-4764
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4764
> > 9. CVE-2015-4774
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4774
> > 10. CVE-2015-4775
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4775
> > 11. CVE-2015-4776
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4776
> > 12. CVE-2015-4777
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4777
> > 13. CVE-2015-4778
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4778
> > 14. CVE-2015-4779
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4779
> > 15. CVE-2015-4780
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4780
> > 16. CVE-2015-4781
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4781
> > 17. CVE-2015-4782
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4782
> > 18. CVE-2015-4783
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4783
> > 19. CVE-2015-4784
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4784
> > 20. CVE-2015-4785
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4785
> > 21. CVE-2015-4786
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4786
> > 22. CVE-2015-4787
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4787
> > 23. CVE-2015-4788
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4788
> > 24. CVE-2015-4789
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4789
> > 25. CVE-2015-4790
> > Link: https://security-tracker.debian.org/tracker/CVE-2015-4790
> > 26. CVE-2016-0682
> > Link: https://security-tracker.debian.org/tracker/CVE-2016-0682
> > 27. CVE-2016-0689
> > Link: https://security-tracker.debian.org/tracker/CVE-2016-0689
> > 28. CVE-2016-0692
> > Link: https://security-tracker.debian.org/tracker/CVE-2016-0692
> > 29. CVE-2016-0694
> > Link: https://security-tracker.debian.org/tracker/CVE-2016-0694
> > 30. CVE-2016-3418
> > Link: https://security-tracker.debian.org/tracker/CVE-2016-3418
> > 31. CVE-2017-3604
> > Link: https://security-tracker.debian.org/tracker/CVE-2017-3604
> > 32. CVE-2017-3605
> > Link: https://security-tracker.debian.org/tracker/CVE-2017-3605
> > 33. CVE-2017-3606
> > Link: https://security-tracker.debian.org/tracker/CVE-2017-3606
> > 34. CVE-2017-3607
> > Link: https://security-tracker.debian.org/tracker/CVE-2017-3607
> > 35. CVE-2017-3608
> > Link: https://security-tracker.debian.org/tracker/CVE-2017-3608
> > 36. CVE-2017-3609
> > Link: https://security-tracker.debian.org/tracker/CVE-2017-3609
> > 37. CVE-2017-3610
> > Link: https://security-tracker.debian.org/tracker/CVE-2017-3610
> > 38. CVE-2017-3611
> > Link: https://security-tracker.debian.org/tracker/CVE-2017-3611
> > 39. CVE-2017-3612
> > Link: https://security-tracker.debian.org/tracker/CVE-2017-3612
> > 40. CVE-2017-3613
> > Link: https://security-tracker.debian.org/tracker/CVE-2017-3613
> > 41. CVE-2017-3614
> > Link: https://security-tracker.debian.org/tracker/CVE-2017-3614
> > 42. CVE-2017-3615
> > Link: https://security-tracker.debian.org/tracker/CVE-2017-3615
> > 43. CVE-2017-3616
> > Link: https://security-tracker.debian.org/tracker/CVE-2017-3616
> > 44. CVE-2017-3617
> > Link: https://security-tracker.debian.org/tracker/CVE-2017-3617
> > 45. CVE-2020-2981
> > Link: https://security-tracker.debian.org/tracker/CVE-2020-2981
> >
> > Signed-off-by: Saloni <jainsaloni0...@gmail.com>
> > ---
> >  meta/recipes-support/db/db_5.3.28.bb | 92 ++++++++++++++++++++++++++++
> >  1 file changed, 92 insertions(+)
> >
> > diff --git a/meta/recipes-support/db/db_5.3.28.bb 
> > b/meta/recipes-support/db/db_5.3.28.bb
> > index b2ae98f05c..000e9ef468 100644
> > --- a/meta/recipes-support/db/db_5.3.28.bb
> > +++ b/meta/recipes-support/db/db_5.3.28.bb
> > @@ -39,6 +39,98 @@ SRC_URI[sha256sum] = 
> > "e0a992d740709892e81f9d93f06daf305cf73fb81b545afe7247804317
> >
> >  LIC_FILES_CHKSUM = "file://LICENSE;md5=ed1158e31437f4f87cdd4ab2b8613955"
> >
> > +# Below CVEs affects only Oracle Berkeley DB as per upstream.
> > +# https://security-tracker.debian.org/tracker/CVE-2015-2583
> > +CVE_CHECK_WHITELIST += "CVE-2015-2583"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-2624
> > +CVE_CHECK_WHITELIST += "CVE-2015-2624"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-2626
> > +CVE_CHECK_WHITELIST += "CVE-2015-2626"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-2640
> > +CVE_CHECK_WHITELIST += "CVE-2015-2640"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-2654
> > +CVE_CHECK_WHITELIST += "CVE-2015-2654"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-2656
> > +CVE_CHECK_WHITELIST += "CVE-2015-2656"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4754
> > +CVE_CHECK_WHITELIST += "CVE-2015-4754"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4764
> > +CVE_CHECK_WHITELIST += "CVE-2015-4764"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4774
> > +CVE_CHECK_WHITELIST += "CVE-2015-4774"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4775
> > +CVE_CHECK_WHITELIST += "CVE-2015-4775"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4776
> > +CVE_CHECK_WHITELIST += "CVE-2015-4776"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4777
> > +CVE_CHECK_WHITELIST += "CVE-2015-4777"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4778
> > +CVE_CHECK_WHITELIST += "CVE-2015-4778"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4779
> > +CVE_CHECK_WHITELIST += "CVE-2015-4779"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4780
> > +CVE_CHECK_WHITELIST += "CVE-2015-4780"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4781
> > +CVE_CHECK_WHITELIST += "CVE-2015-4781"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4782
> > +CVE_CHECK_WHITELIST += "CVE-2015-4782"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4783
> > +CVE_CHECK_WHITELIST += "CVE-2015-4783"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4784
> > +CVE_CHECK_WHITELIST += "CVE-2015-4784"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4785
> > +CVE_CHECK_WHITELIST += "CVE-2015-4785"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4786
> > +CVE_CHECK_WHITELIST += "CVE-2015-4786"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4787
> > +CVE_CHECK_WHITELIST += "CVE-2015-4787"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4788
> > +CVE_CHECK_WHITELIST += "CVE-2015-4788"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4789
> > +CVE_CHECK_WHITELIST += "CVE-2015-4789"
> > +# https://security-tracker.debian.org/tracker/CVE-2015-4790
> > +CVE_CHECK_WHITELIST += "CVE-2015-4790"
> > +# https://security-tracker.debian.org/tracker/CVE-2016-0682
> > +CVE_CHECK_WHITELIST += "CVE-2016-0682"
> > +# https://security-tracker.debian.org/tracker/CVE-2016-0689
> > +CVE_CHECK_WHITELIST += "CVE-2016-0689"
> > +# https://security-tracker.debian.org/tracker/CVE-2016-0692
> > +CVE_CHECK_WHITELIST += "CVE-2016-0692"
> > +# https://security-tracker.debian.org/tracker/CVE-2016-0694
> > +CVE_CHECK_WHITELIST += "CVE-2016-0694"
> > +# https://security-tracker.debian.org/tracker/CVE-2016-3418
> > +CVE_CHECK_WHITELIST += "CVE-2016-3418"
> > +# https://security-tracker.debian.org/tracker/CVE-2017-3604
> > +CVE_CHECK_WHITELIST += "CVE-2017-3604"
> > +# https://security-tracker.debian.org/tracker/CVE-2017-3605
> > +CVE_CHECK_WHITELIST += "CVE-2017-3605"
> > +# https://security-tracker.debian.org/tracker/CVE-2017-3606
> > +CVE_CHECK_WHITELIST += "CVE-2017-3606"
> > +# https://security-tracker.debian.org/tracker/CVE-2017-3607
> > +CVE_CHECK_WHITELIST += "CVE-2017-3607"
> > +# https://security-tracker.debian.org/tracker/CVE-2017-3608
> > +CVE_CHECK_WHITELIST += "CVE-2017-3608"
> > +# https://security-tracker.debian.org/tracker/CVE-2017-3609
> > +CVE_CHECK_WHITELIST += "CVE-2017-3609"
> > +# https://security-tracker.debian.org/tracker/CVE-2017-3610
> > +CVE_CHECK_WHITELIST += "CVE-2017-3610"
> > +# https://security-tracker.debian.org/tracker/CVE-2017-3611
> > +CVE_CHECK_WHITELIST += "CVE-2017-3611"
> > +# https://security-tracker.debian.org/tracker/CVE-2017-3612
> > +CVE_CHECK_WHITELIST += "CVE-2017-3612"
> > +# https://security-tracker.debian.org/tracker/CVE-2017-3613
> > +CVE_CHECK_WHITELIST += "CVE-2017-3613"
> > +# https://security-tracker.debian.org/tracker/CVE-2017-3614
> > +CVE_CHECK_WHITELIST += "CVE-2017-3614"
> > +# https://security-tracker.debian.org/tracker/CVE-2017-3615
> > +CVE_CHECK_WHITELIST += "CVE-2017-3615"
> > +# https://security-tracker.debian.org/tracker/CVE-2017-3616
> > +CVE_CHECK_WHITELIST += "CVE-2017-3616"
> > +# https://security-tracker.debian.org/tracker/CVE-2017-3617
> > +CVE_CHECK_WHITELIST += "CVE-2017-3617"
> > +# https://security-tracker.debian.org/tracker/CVE-2020-2981
> > +CVE_CHECK_WHITELIST += "CVE-2020-2981"
> > +
> >  inherit autotools
> >
> >  # The executables go in a separate package - typically there
> > --
> > 2.17.1
> >
> >
> >
> >
>
> 
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#155979): 
https://lists.openembedded.org/g/openembedded-core/message/155979
Mute This Topic: https://lists.openembedded.org/mt/85573913/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to