Hi Richard,

Thank you for acknowledgement on my proposal.
Please consider my additional input for VEX standard.

There is total four main VEX standard status:
- Fixed
- Affected
- Not Affected
- Under Investigation

Out for 4 standard we can adopt Fixed and Not affected status for CVE fixing.
As these two statuses will never get changed for specific package and CVE.

Regarding the CVE status of community and VEX standard, we can map like 
following:

Existing Status         | VEX adoption
-------------------------------------------
Patched         | Fixed         
Ignore          | Not Affected
Not required    | Not Affected

Remaining two statuses Affected and Under investigation would be changed with 
time as following:
* Under Investigation:
- When any new CVE is reported against any package then by default it would go 
with "under investigation" status
- Until we make the final status like fixed/not affected/affected status after 
our final investigation on specific CVE.
* Affected:
- Regarding affected status it would be temporary status until we find the 
actual fix for the CVE.
- Once we have a fix the CVE then status would be as fixed/not affected which 
we can input to our recipe.

Thanks,
Sanjay

-----Original Message-----
From: openembedded-core@lists.openembedded.org 
<openembedded-core@lists.openembedded.org> On Behalf Of Richard Purdie
Sent: Saturday, June 3, 2023 2:57 AM
To: adrian.freiho...@gmail.com; Valek, Andrej <andrej.va...@siemens.com>
Cc: rybczyn...@gmail.com; openembedded-core@lists.openembedded.org; 
mikko.rap...@linaro.org; Marko, Peter <peter.ma...@siemens.com>; Sanjaykumar 
kantibhai Chitroda -X (schitrod - E-INFO CHIPS INC at Cisco) 
<schit...@cisco.com>
Subject: Re: [OE-core][PATCH v3 1/3] cve-check: add option to add additional 
patched CVEs

On Fri, 2023-06-02 at 23:10 +0200, adrian.freiho...@gmail.com wrote:
> I like the VEX proposal from Sanjay.
> 
> - It is a standard that can be supported by many tools and requested 
> by customers. One use case I see is where a vendor sells a product 
> with an SBOM. The customer can then match the open vulnerabilities to 
> the current state of the NIST database using a standard tool based on SBOM.
> Aligning the categories to a standard would be helpful for this.
> (Yocto's CVE check is great for Yocto, but cannot be used 
> independently of Yocto.)
> - A minimum number of categories is defined. All details can be added 
> to the REASON variable.

I think you could map some of the status items I proposed to VEX statuses but 
I'm not convinced it makes sense to go directly to that.

Anything we don't have a status for is effectively "under investigation", 
anything we don't list is fixed or not affected and if we know something is 
affected, a fix would likely follow very quickly.
The data set doesn't really fit what we're able to do or the wrkflows we can 
follow, even if it is what some product customers would want to know. Part of 
the issue is we're not the actual product here.

Cheers,

Richard
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#182356): 
https://lists.openembedded.org/g/openembedded-core/message/182356
Mute This Topic: https://lists.openembedded.org/mt/99007092/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

    • ... Mikko Rapeli
    • ... Michael Opdenacker via lists.openembedded.org
    • ... Marta Rybczynska
      • ... Andrej Valek via lists.openembedded.org
      • ... Mikko Rapeli
        • ... Andrej Valek via lists.openembedded.org
          • ... Andrej Valek via lists.openembedded.org
            • ... Richard Purdie
              • ... Adrian Freihofer
              • ... Richard Purdie
              • ... Sanjaykumar kantibhai Chitroda -X (schitrod - E-INFO CHIPS INC at Cisco) via lists.openembedded.org
              • ... Richard Purdie
  • ... Andrej Valek via lists.openembedded.org
  • ... Andrej Valek via lists.openembedded.org
  • ... Andrej Valek via lists.openembedded.org
    • ... Mikko Rapeli
    • ... Michael Opdenacker via lists.openembedded.org
      • ... Andrej Valek via lists.openembedded.org
        • ... Sanjaykumar kantibhai Chitroda -X (schitrod - E-INFO CHIPS INC at Cisco) via lists.openembedded.org
    • ... Andrej Valek via lists.openembedded.org
    • ... Andrej Valek via lists.openembedded.org

Reply via email to